The news just form the twitter-verse just doesn't stop coming. In latest news, nChain's Chief Scientist Dr.Craig S. Wright called out some projects and reminded them that intellectual property law obviously still applies, even here in the blockchain space. Dr.Wright especially called out EOS as it seems that all of their projects seem to violate at least one of Dr.Wright's patents. He even included links to a couple of published patents to prove his point..



He was even more specific in regards to naming EOS specifically in a earlier tweet which read..



Dr.Wright seems to always be one step ahead of the rest of the people in the blockchain space and his understanding of the fundamental principles of Bitcoin and the core design is unmatched (in my opinion of course, but not only my opinion). Dr.Wright and nChain have dozens of granted and published patents, a hundreds more being processed even more are in the pipeline. The portfolio is said to consist of over a thousand patents. Thats more than Edison! Still think he's not Satoshi?

Here is a sample smattering of patents from Dr.Craig S. Wright & nChain

Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys

The present disclosure relates to determining a common secret for two nodes. In some applications, the common secret may be used for cryptography to enable secure communication between two nodes. The invention may be suited for use with, but not limited to, digital wallets, blockchain (e.g. Bitcoin) technologies and personal device security.

Personal device security using elliptic curve cryptography for secret sharing
The invention may provide a computer implemented method. It may provide a security method. It may provide a method of encrypting data at an electronic device (S), the electronic device being associated with a key device (C). The electronic device may be further associated with a first asymmetric cryptography pair having a first electronic device private key (V1S) and a first electronic device public key (P1S), and the key device may be associated with a second asymmetric cryptography pair having a first key device private key (V1C) and a first key device public key (P1C);

Registry and automated management method for blockchain-enforced smart contracts
This invention relates generally to computer protocols and, more particularly, to the verification, enforcement and/or performance of condition controlled processes such as, for example, those relating to contracts. The invention is particularly suited for use with a blockchain network, and may be used to advantage with a smart contract.

Tokenisation method and system for implementing exchanges on a blockchain
This invention relates generally to a tokenisation method and corresponding system for the exchange of entities or assets via a computer-implemented network, and control thereof. It relates to security mechanisms for exchanges and transfers on a network. In particular, it relates to the transfer of contracts. It may be suited for use with, but not limited to, a non-debt lending process. It may be used in conjunction with any peer-to-peer distributed network. This may be blockchain-related technology, including (but not limited to) the Bitcoin Blockchain.

Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
This invention relates generally to computer and data security, and more particularly to secure handling of highly sensitive data items such as cryptographic keys. The invention provides an access control mechanism. The invention is particularly suited for, but not limited to, use with digital (software) wallets. This may include, for example, wallets used in relation to cryptocurrencies such as Bitcoin. The invention provides an advantageous access control mechanism.

Blockchain implemented method and system
The invention relates to computer-based, electronic ledgers, and in particular distributed ledgers known as "blockchains". The invention is suited for use with the Bitcoin blockchain and associated protocol, but is not limited in this regard and can be deployed using other blockchain platforms. The invention provides a novel and advantageous technique for executing a micropayment channel in which the number of transactions (TXs) that need to be submitted to the blockchain can be greatly reduced. An initial transaction (Tx) can be replaced by one or more subsequent transactions which another party can hold onto until a selected transaction is completed (signed) and submitted to the network. In one embodiment, the invention provides a computer-implemented method for performing an exchange via a blockchain, comprising the step of submitting a funding transaction to the blockchain network, wherein the funding transaction i) comprises a tokenised contract relating to an asset to be transferred from a second user to a first user; and ii) is signed by the first user. It also comprises the step of sending, from the first user to the second user, one or more subsequent transactions wherein each said subsequent transaction spends an output of the funding transaction and is signed by the first user. It includes the step of submitting one of the subsequent transactions to the blockchain network, the submitted transaction having been signed by the second user.

Reactive and pre-emptive security system for the protection of computer networks & systems
The invention provides mechanisms for enhancing the security and protection of a computer-based system or network. It relates, in part, to the use of a decoy (which may be termed "honeypot" or "honeynet") for collecting attacker-related data, and/or diverting malicious behaviour away from legitimate resources. In one embodiment, the invention provides a method comprising the steps of receiving, processing and logging network traffic data of a plurality of users, where the network traffic is received from a plurality of participating users; determining an attacker profile from the network traffic data; determining a honeypot or honeynet configuration based on the attacker profile; and upon receipt of a valid information request from a user of the plurality of users, providing the determined attacker profile and configuration to the user. Additionally or alternatively, it may provide a computer-implemented method comprising the steps of receiving, processing and logging network traffic data; based on processed network traffic data: determining that network traffic originates from an attacker, determining a risk classification; and determining a decoy configuration based on the risk classification; upon receipt of a valid information request from a user, providing the determined risk classification and decoy configuration to the user.

Consolidated blockchain-based data transfer control method and system
The invention relates to blockchain technologies such as, for example, the Bitcoin blockchain. It provides a method (and corresponding system) of generating public keys for a linked structure of entities, wherein a function is applied to a deterministic key to generate the public key, the deterministic key being generated by applying a hash function to either a parent entity identifier to generate a parent deterministic key, or to a sum of the parent deterministic key and a child entity identifier to generate a child deterministic key. There is also provided a computer-implemented method for accounting on transactions with entities, the transaction being recorded in a peer-to- peer distributed ledger (blockchain), the method comprising: associating public addresses of the entities with one or more identifiers of a first classification type to classify the public addresses based on the first classification type; receiving, from a communication network, a first identifier of the one or more identifiers of the first classification type; determining a first set of public addresses associated with the first identifier, wherein the first set of public address is a subset of the public addresses; and determining a first set of transactions in the peer-to-peer distributed ledger based on the first set of public addresses associated with the first identifier, wherein the first set of transactions is a subset of the transactions.

Method for controlling the flow execution of a generated script of a blockchain transaction
The invention provides a computer-implemented method (and corresponding system) for generating a blockchain transaction (Tx). This may be a transaction for the Bitcoin blockchain or another blockchain protocol. The method comprises the step of using a software resource to receive, generate or otherwise derive at least one data item; and then insert, at least once, at least one portion of code into a script associated the transaction. Upon execution of the script, the portion of code provides the functionality of a control flow mechanism, the behaviour of the control flow mechanism being controlled or influenced by the at least one data item. In one embodiment, the code is copied/inserted into the script more than once. The control flow mechanism can be a loop, such as a while or for loop, or a selection control mechanism such as a switch statement. Thus, the invention allows the generation of a more complex blockchain script and controls how the script will execute when implemented on the blockchain. This, in turns provides control over how or when the output of the blockchain transaction is unlocked.

The invention relates to a technique for implementing, controlling and automating a task or process on a blockchain such as, but not limited to, the Bitcoin blockchain. The invention is particularly suited for, but not limited to, automated execution of contracts such as smart contracts for financial agreements. However, other types of tasks and non-financial contracts can be implemented. The invention can be viewed as the implementation or incarnation of a state machine or DFA on a blockchain by using the unspent outputs of blockchain Transactions to represents the states of the machine, and spending of those outputs as the transition of the machine from one state to another. The invention provides a technical realisation and implementation of a mathematical model of computation conceived as an abstract machine that can be in one of a finite set of states, and can change from one state to another (transition) when a triggering event of a finite set (called input) occurs. The invention comprises compilation and codification techniques for the DFA implementation.

The invention provides a secure method for exchanging entities via a blockchain. The invention incorporates tokenisation techniques, and also techniques for embedding metadata in a redeem script of a blockchain transaction. Embodiment(s) provide a method of: generating a first script, the first script comprising: a first set of metadata associated with a first invitation for the exchange of a first entity by a first user, the first set of metadata comprising an indication of the first entity to be offered for exchange and a first location condition for the exchange, a first user public key (P1A) associated with the first user, wherein the first user public key (P1A) is part of an asymmetric cryptographic pair comprising the first user public key (P1A) and a first user private key (V1A). The script may further comprise a first third-party public key (P1T) associated with a first third-party, wherein the first third-party public key (P1T) is part of an asymmetric cryptographic pair comprising the first third-party public key (P1T) and a first third-party private key (V1T) The method further comprises the steps of hashing the first script to generate a first script hash and publishing the first script and the first script hash on a distributed hash table (DHT).

The invention relates to blockchain technologies such as the Bitcoin ledger, and for the control and performance of secure, efficient exchanges conducted via the blockchain. It comprises tokenisation techniques and methods for embedding metadata in a blockchain transaction. It provides a computer implemented method for performing a transfer, the method comprising scanning entries in a distributed hash table (DHT) distributed across a first network, the DHT comprising a plurality of entries, each entry comprising an invitation to perform an exchange and a link to a transaction on a peer-to-peer (P2P) distributed ledger distributed across a second network, each invitation including metadata comprising an indication of entities to be exchanged and one or more conditions for the exchange; determining a match between a first set of metadata in a first invitation of a first entry from a first user and a second set of metadata in a second invitation of a second entry from a second user, the determining comprising: identifying a match between indications of entities to be exchanged in the first and second invitations; and identifying a match between one or more of the conditions of the first invitation and one or more of the conditions of the second invitation; generating a first exchange transaction; and broadcasting, over the second network, the first exchange transaction for inclusion on a P2P distributed ledger, wherein the first exchange transaction comprises: an indication of a first quantity of a cryptocurrency to be transferred; a first input provided from an output of a transaction on the P2P distributed ledger linked to the first entry; a first script, a first user private key associated with the first user, a first third-party private key associated with a first third-party, wherein the first script comprises: the first set of metadata, a first user public key associated with the first user, the first user public key being a cryptographic pair with the first user private key, and a first third-party public key pair associated with the first third-party, the first third-party public key being a cryptographic pair with the first third-party private key and a first output indicating a transfer of a first quantity of the first entity from the first user to the second user.

The invention provides a secure method for exchanging entities via a blockchain. The invention incorporates tokenisation techniques, and also techniques for embedding metadata in a redeem script of a blockchain transaction. Embodiment(s) provide a computer implemented method of performing a transfer, the method comprising: generating a first exchange transaction, and broadcasting, over a first network, the first exchange transaction for inclusion on a P2P distributed ledger, wherein the first exchange transaction comprises: an indication of a first quantity of a cryptocurrency to be transferred; a first input provided from an output of a first invitation transaction from a first user, the first invitation transaction previously included on the P2P distributed ledger, a first script, a first user private key associated with the first user, a first third- party private key associated with a first third-party, and a first output indicating a transfer of a first entity from the first user to a second user; and wherein the first script comprises: a first set of metadata providing an indication of the first entity to be transferred and a first set of conditions for the transfer, a first user public key associated with the first user, the first user public key being a cryptographic pair with the first user private key, and a first third-party public key associated with the first third-party, the first third-party public key being a cryptographic pair with the first third-party private key.

The invention relates generally to cryptographic techniques for secure processing, transmission and exchange of data. It also relates to peer-to-peer distributed ledgers such as (but not limited to) the Bitcoin blockchain. In particular, it relates to control solutions for identifying, protecting, extracting, transmitting and updating data in a cryptographically controlled and secure manner. It also relates to system inter- operability and the ability to communicate data between different and distinct computing systems. The invention provides a computer implemented method (and corresponding systems) comprising the steps of identifying a set of first structure public keys comprising at least one public root key associated with a first structure of interest of an entity and one or more associated public sub-keys; deriving a deterministic association between the at least one public root key and the one or more associated public sub-keys; and extracting data from a plurality of transactions (TXs) from a blockchain. The data comprises data indicative of a blockchain transaction (Tx) between the first structure and at least one further structure; and a first structure public key associated with the first structure. The first structure public key is part of a cryptographic public/private key. The method includes the step of generating an output for the first structure of interest by matching at least part of the set of first structure public keys to the extracted transaction data using the deterministic association. The one or more public sub-keys is generated or determined using Elliptic Curve Cryptography (ECC) and a deterministic key (DK) that is based on a cryptographic hash of a message (M). The one or more public sub-keys is determined based on a scalar addition of an associated public parent key and the scalar multiplication of a deterministic key (DK) and a generator (G).

The invention provides a secure method for exchanging entities via a blockchain. The invention incorporates tokenisation techniques, and also techniques for embedding metadata in a redeem script of a blockchain transaction. Embodiment(s) provide a computer implemented method of performing an exchange of entities, the method comprising: receiving, from a first user over a communications network, a first invitation to perform the exchange, the first invitation comprising a first set of metadata associated with the invitation, wherein the first set of metadata comprises an indication of entities to be exchanged and a first set of conditions for the exchange; generating a first script, the first script comprising: the first set of metadata, a first user public key (P1A) associated with the first user, wherein the first user public key (P1A) is a cryptographic pair with a first user private key (V1A), and a first third-party public key (P1T) associated with a first third-party, wherein the first third-party public key (P1T) is a cryptographic pair with a first third-party private key (V1T); hashing the first script to generate a first script hash; publishing the first script and the first script hash on a distributed hash table (DHT) distributed across a first network; and broadcasting, on a second network, a first invitation transaction for inclusion on a peer-to-peer (P2P) distributed ledger, the first invitation transaction comprising an indication of a first quantity of a cryptocurrency to be transferred and the first script hash.

A computer-implemented method of determining the validity of a token (T) associated with a quantity of cryptocurrency is provided. In some embodiments, the method comprises: a second user (B) receiving, over a communications network, a first transaction comprising a transfer of the token (T) from a first user (A) to the second user (B), querying a peer-to-peer distributed ledger to determine whether an authenticated transaction associated with the token (T) can be identified, wherein the authenticated transaction comprises a previous transaction associated with the token (T) and wherein the token (T) has been authorised and responsive to identifying an authenticated transaction, determining that the token (T) is valid. In some embodiments, the method comprises: a second user: receiving, over a communications network, a first transaction comprising a transfer of the token from a first user to the second user; querying a title registry database to determine if a second transaction comprising a transfer of the token is recorded in the title registry database; and responsive to determining that the second transaction is recorded in the title registry database, determining that the token is valid.

the disclosure relates to a system implemented by blockchain and transmission control method and / or distribution of digital content. in an illustrative embodiment, the blockchain is blockchain Bitcoin. the first user (5) is associated with an amount of cryptocurrency deposit in a common address (23), in which to spend from the common address are required signatures of both a first private key of the first user (5) and a second private key of the second user (7). the system (1) comprising a first node (15) and a second node (17) .- the first node (15) is associated with a first user (5) comprising a first processing device. the second node (17) is associated with the second user (7) comprising a second processing device and based on the verification result of the second processing device is further configured to: (iii) providing access through the communications network (8 ), the episode of digital content (i) to be available to the first node (15); and (iv) to subscribe, with the second private key of the second user (5), the payment transaction and send the payment transaction subscribed to a distributed ledger (blockchain) (9).

Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

The invention comprise s a computer - implemented method and system for control ling an exchange process, such as a loan, conducted between at least two parties via a blockchain such as the Bitcoi n blockchain. A method according to the invention may comprise the step of generating a first blockchain transaction which includes a redeem script. The redeem script comprises a cryptographic public key associated with an initiating party and metadata w hich includes a hash of an exchange - related document; a redeem address; and an amount of digital currency. A second blockchain transaction is generated and published to the blockchain so as to spend the digital currency to the redeem address. This provid es the advantage that the further transaction will be publically available and thus detectable by other parties once it has been published. The further transaction can provide the information necessary to trigger a response e.g. an offer from another (res ponding) party who publishes their response on the blockchain. Thus, the exchange process can be implemented via a multi - transaction mechanism on the blockchain rather than an alternative medium. The exchange related document may be an invitation (offer/ request) which is stored off - block in a repository such as a Distributed Hash Table (DHT). The invitation may be an invitation to engage in a contract. A smart contract (and associated blockchain transaction) may be formed upon condition that a plurality of participants (e.g. lenders/borrowers) are matched with each other via one or more responses effected via transactions on the blockchain.

The invention provides a novel and advantageous method and corresponding system. The invention is implemented via a distributed electronic ledge (blockchain). This may or may not be the Bitcoin blockchain. The invention is suited for the exchange or transfer of an asset, e.g. a digital asset, such as tickets and the like (but not limited in this regard). An embodiment may provide a computer-implemented method for transferring an asset between a first user and a second user via a blockchain, and redemption of a third transaction causes the revealable data to become publicly available via the blockchain and thus known to the second user, who can use it in another unlocking script.

A method and system of recording multiple transactions between a multiple of users on a blockchain (9), including a first transaction (22) from a first user (5) to a second user (7) and a second transaction (24) from the second user (7) to the first user (5). The blockchain may be, for example, the Bitcoin blockchain. The method may include receiving (110) a first request from a first node (15) associated with the first user (A) to transfer a first quantity of cryptocurrency associated with the first transaction (22) and receiving (120) a second request from a second node (17) to transfer a second quantity associated with the second transaction (24). The first transaction (22) is conditional on receiving (120) the second request and the second transaction (24) is conditional on receiving (110) the first request. The method also includes verifying (130) the first request and second request that includes determining both the conditional steps of receiving the first request and second request are satisfied. Based on verifying (130) the first request and second request, the method includes sending (140) a data output to the blockchain (9) to record the transfers of cryptocurrency associated with the first and second transactions (22, 24).

The present invention relates, in general, blockchain implementations and is suitable for, but not limited to use with the blockchain bitcoin. it can be used to implement automated processes such as device control / system, process control, distributed computing and storage and others. the invention provides a solution that uses a blockchain to control a process running on a computational resource. in a preferred embodiment, the computer resource, running simultaneously and parallel to blockchain, manages the operation based on loop. computational feature continuously monitors the state of blockchain and any other data or input source outside the blockchain. the execution of the loop is influenced by the state blockchain. each iteration of the loop that is performed by computational resource is recorded in a transaction that is written in blockchain. it is stored as a hash of the transaction within the metadata. the computational resource to find a transaction that contains a hash related to the loop, it accesses the relevant portion of the code. the loop contains a conditional statement that allows the computational resource to decide what action to take. the condition may be dependent on the state blockchain or any other data source. the action can be any action, in or out of blockchain. Thus, the combination of computer resources and blockchain provide a solution that is (at least partially) Turing complete.

the invention relates to blockchain technologies such as blockchain of bitcoin, and tokenization assets or entities. it is particularly suitable to implement a payroll blockchain on a platform and comprises a method (100) and system (1) cryptocurrency transfer from a first node (3) to a second node (7). both nodes (3, 7) are associated with a payroll and have a respective pair of asymmetric cryptography, each pair including a private master key and a public master key. private and respectively additional public keys can be determined based on the private master key, public master key and a seed value on each node. additional private and public keys can form a hierarchical structure. a common secret can be determined in each node (3, 7) based on additional private and public keys. the common secret may be used to transmit confidential information securely over a communications network (5).

The invention presents a solution in which blockchain Transactions are created to implement the functionality of a logic gate. The invention may be implemented on the Bitcoin platform or an alternative blockchain platform. The transaction includes a locking script which comprises instructions selected so as to implement the functionality of an logic gate such as the XOR gate. When the script is executed (because a second transaction is attempting to spend the output associated with the locking script) the inputs will be processed by the conditional instructions to provide an output of TRUE or FALSE. The second transaction is transmitted to the blockchain network for validation and, if determined to be valid, it will be written to the blockchain. Validation of the second transaction can be interpreted as a TRUE output. Thus, the locking script of the first transaction provides the functionality of the desired logic gate. The invention provides numerous advantages and can be used in a wide variety of applications, such as for the implementation of control systems and unit.