Blockchain-based unexpected data detection
First Claim
Patent Images
1. A method, comprising:
- at a computing device configured to operate in a peer-to-peer (P2P) network, the computing device including at least one or more processors and memory storing at least a portion of a blockchain of the P2P network;
receiving a first plurality of network function requests, wherein each of the first plurality of network function requests is associated with a particular wallet;
creating a first pending block of the blockchain of the P2P network, wherein the first pending block includes the first plurality of network function requests;
scanning each of the first plurality of network function requests based on one or more security criteria;
based on the scanning, identifying at least one network function request of the first plurality of network function requests that violates at least one of the one or more security criteria;
responsive to identifying the at least one network function request that violates at least one of the one or more security criteria, flagging at least one wallet associated with the at least one network function request;
comparing an identifier corresponding to the at least one flagged wallet with a plurality of identifiers corresponding to previously flagged wallets, wherein each of the previously flagged wallets is associated with a flag rating;
based on the comparison, identifying that the identifier corresponding to the at least one flagged wallet matches with at least one of the plurality of identifiers corresponding to the previously flagged wallets; and
updating the flag rating associated with the at least one flagged wallet matched with at least one of the previously flagged wallets;
receiving, from a user of the computing device, entry of information corresponding to a network function request involving the at least one flagged wallet, wherein the network function request and the first plurality of network function requests include one or more of balance sheet transaction requests and smart contract operation requests; and
displaying the flag rating associated with the at least one flagged wallet.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatuses for blockchain-based unexpected data detection are described herein. In some arrangements, a node within a decentralized peer-to-peer (e.g., P2P) network may receive a plurality of network function requests corresponding to the decentralized network. The node may analyze the plurality of network function requests to identify whether the requests included unexpected data and/or irregular data, and/or are associated with flagged wallets and/or smart contracts.
-
Citations
12 Claims
-
1. A method, comprising:
- at a computing device configured to operate in a peer-to-peer (P2P) network, the computing device including at least one or more processors and memory storing at least a portion of a blockchain of the P2P network;
receiving a first plurality of network function requests, wherein each of the first plurality of network function requests is associated with a particular wallet; creating a first pending block of the blockchain of the P2P network, wherein the first pending block includes the first plurality of network function requests; scanning each of the first plurality of network function requests based on one or more security criteria; based on the scanning, identifying at least one network function request of the first plurality of network function requests that violates at least one of the one or more security criteria; responsive to identifying the at least one network function request that violates at least one of the one or more security criteria, flagging at least one wallet associated with the at least one network function request; comparing an identifier corresponding to the at least one flagged wallet with a plurality of identifiers corresponding to previously flagged wallets, wherein each of the previously flagged wallets is associated with a flag rating; based on the comparison, identifying that the identifier corresponding to the at least one flagged wallet matches with at least one of the plurality of identifiers corresponding to the previously flagged wallets; and updating the flag rating associated with the at least one flagged wallet matched with at least one of the previously flagged wallets; receiving, from a user of the computing device, entry of information corresponding to a network function request involving the at least one flagged wallet, wherein the network function request and the first plurality of network function requests include one or more of balance sheet transaction requests and smart contract operation requests; and displaying the flag rating associated with the at least one flagged wallet. - View Dependent Claims (2, 3, 4)
- at a computing device configured to operate in a peer-to-peer (P2P) network, the computing device including at least one or more processors and memory storing at least a portion of a blockchain of the P2P network;
-
5. A computing device configured to operate in a peer-to-peer (P2P) network, comprising:
- one or more processors; and
memory storing at least a portion of a blockchain of the P2P network and computer-readable instructions that, when executed by the one or more processors, cause the computing device to; receive a first plurality of network function requests, wherein each of the first plurality of network function requests is associated a particular wallet; create a first pending block of the blockchain of the P2P network, wherein the first pending block includes the first plurality of network function requests; scan each of the first plurality of network function requests based on one or more security criteria; based on the scanning, identify at least one network function request of the first plurality of network function requests that violates at least one of the one or more security criteria; and responsive to identifying the at least one network function request that violates at least one of the one or more security criteria, flag at least one wallet associated with the at least one network function request; compare an identifier corresponding to the at least one flagged wallet with a plurality of identifiers corresponding to previously flagged wallets, wherein each of the previously flagged wallets is associated with a flag rating; based on the comparison, identify that the identifier corresponding to the at least one flagged wallet matches with at least one of the plurality of identifiers corresponding to the previously flagged wallets; and update the flag rating associated with the at least one flagged wallet matched with at least one of the previously flagged wallets; receive, from a user of the computing device, entry of information corresponding to a network function request involving the at least one flagged wallet, wherein the network function request and the first plurality of network function requests include one or more of balance sheet transaction requests and smart contract operation requests; and displaying the flag rating associated with the at least one flagged wallet. - View Dependent Claims (6, 7, 8)
- one or more processors; and
-
9. One or more non-transitory computer-readable media storing instructions that, when executed by a computing device configured to operate in a peer-to-peer (P2P) network, the computing device including at least one or more processors and memory storing at least a portion of a blockchain of the (P2P) network, cause the computing device to:
-
receive a first plurality of network function requests related to a first pending block of the blockchain of the P2P network, wherein each of the first plurality of network function requests are associated with one or more wallets; scan each of the first plurality of network function requests based on one or more security criteria; based on the scanning, identify at least one network function request of the first plurality of network function requests that violates at least one of the one or more security criteria; and responsive to identifying the at least one network function request that violates at least one of the one or more security criteria, flag at least one wallet associated with the at least one network function request; compare an identifier corresponding to the at least one flagged wallet with a plurality of identifiers corresponding to previously flagged wallets, wherein each of the previously flagged wallets is associated with a flag rating; based on the comparison, identify that the identifier corresponding to the at least one flagged wallet matches with at least one of the plurality of identifiers corresponding to the previously flagged wallets; update the flag rating associated with the at least one flagged wallet matched with at least one of the previously flagged wallets; receive, from a user of the computing device, entry of information corresponding to a network function request involving the at least one flagged wallet, wherein the network function request and the first plurality of network function requests include one or more of balance sheet transaction requests and smart contract operation requests; and displaying the flag rating associated with the at least one flagged wallet. - View Dependent Claims (10, 11, 12)
-
Specification