CRYPTOGRAPHIC CURRENCY USER DIRECTORY DATA AND ENHANCED PEER-VERIFICATION LEDGER SYNTHESIS THROUGH MULTI-MODAL CRYPTOGRAPHIC KEY-ADDRESS MAPPING
First Claim
1. A method, using a computer processor and a physical memory, comprising:
- determining that a propagation packet is a transaction of a cryptographic currency propagating across a network for integration into a peer-verification ledger, the transaction comprising a value transfer of the cryptographic currency between an input key-address of an input of the transaction and an output key-address of an output of the transaction;
extracting an IP address from a TCP/IP layer of the propagation packet associated with the transaction;
extracting, from the transaction, a transactional hash associated with the input of the transaction, the transactional hash referencing a previous output of a previous transaction;
analyzing the peer-verification ledger to determine the input key-address associated with transactional hash referencing the previous output;
extracting the input key-address of the input of the transaction of the cryptographic currency propagating across the network for integration into the peer-verification ledger;
linking the IP address from the TCP/IP layer of the propagation packet with the input key-address of the input of the transaction; and
determining the input key-address of the input of the transaction is under a suspected control of a user of interest based upon an association between the user of interest and the IP address extracted from the TCP/IP layer of the propagation packet of the transaction.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a method and a system of cryptographic currency user directory data and enhanced peer-verification ledger synthesis through multi-modal cryptographic key-address mapping. The method determines that a propagation packet is a transaction of a cryptographic currency and extracts both an IP address and an input key-address to determine that the input key-address is under a suspected control of a user of interest. The method also determines that a relayed key-address communicated between a user of interest and a correspondent is under the suspected control of the user of interest, and/or that and/or an exhibited key-address of a web content is under the suspected control of the user of interest. The suspected control may be added to an enhanced ledger data and/or a user directory data. The system implementing one or more of the methods includes a set of collections servers, a directory server, and a wide area network.
196 Citations
20 Claims
-
1. A method, using a computer processor and a physical memory, comprising:
-
determining that a propagation packet is a transaction of a cryptographic currency propagating across a network for integration into a peer-verification ledger, the transaction comprising a value transfer of the cryptographic currency between an input key-address of an input of the transaction and an output key-address of an output of the transaction; extracting an IP address from a TCP/IP layer of the propagation packet associated with the transaction; extracting, from the transaction, a transactional hash associated with the input of the transaction, the transactional hash referencing a previous output of a previous transaction; analyzing the peer-verification ledger to determine the input key-address associated with transactional hash referencing the previous output; extracting the input key-address of the input of the transaction of the cryptographic currency propagating across the network for integration into the peer-verification ledger; linking the IP address from the TCP/IP layer of the propagation packet with the input key-address of the input of the transaction; and determining the input key-address of the input of the transaction is under a suspected control of a user of interest based upon an association between the user of interest and the IP address extracted from the TCP/IP layer of the propagation packet of the transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, using a computer processor and physical memory, comprising:
-
determining that a propagation packet is a transaction of a cryptographic currency propagating across a network for integration into a peer-verification ledger, the transaction comprising a value transfer of the cryptographic currency between an input key-address of an input of the transaction and an output key-address of an output of the transaction; extracting an IP address from a TCP/IP layer of the propagation packet associated with the transaction; extracting, from the transaction, a transactional hash associated with the input of the transaction, the transactional hash referencing a previous output of a previous transaction; analyzing the peer-verification ledger to determine the input key-address associated with the transactional hash referencing the previous output; extracting the input key-address of the input of the transaction of the cryptographic currency propagating across the network for integration into the peer-verification ledger; linking the IP address from the TCP/IP layer of the propagation packet with the input key-address of the input of the transaction; and designating, within an enhanced ledger data, the input key-address of the input of the transaction as under a suspected control of a user of interest based upon an association between the user of interest and the IP address extracted from the TCP/IP layer of the propagation packet of the transaction. - View Dependent Claims (14, 15, 16)
-
-
17. A system comprising:
-
a collection server associated with an access point and having a computer processor and physical memory, to intercept an internet protocol packet determined by the collection server to have an association with at least one of a transaction of a cryptographic currency propagating across a network for integration into a peer-verification ledger and a key-bearing communication between a user of interest and a correspondent of the user of interest, an IP extraction module to extract an IP address from a TCP/IP layer of the propagation packet associated with at least one of the transaction and the key-bearing communication, a key extraction module to extract at least one of a transactional hash of an input of the transaction of the cryptographic currency propagating across the network for integration into the peer-verification ledger and a relayed key-address of the key-bearing communication between the user of interest and the correspondent of the user of interest, the network, a cryptocurrency network, and a directory server, to house at least one of a user directory data, an enhanced ledger data and a ledger copy data. - View Dependent Claims (18, 19, 20)
-
Specification