최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0262713 (2014-04-26) |
등록번호 | US-9830593 (2017-11-28) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 1 인용 특허 : 246 |
Disclosed is a method and a system of cryptographic currency user directory data and enhanced peer-verification ledger synthesis through multi-modal cryptographic key-address mapping. The method determines that a propagation packet is a transaction of a cryptographic currency and extracts both an IP
Disclosed is a method and a system of cryptographic currency user directory data and enhanced peer-verification ledger synthesis through multi-modal cryptographic key-address mapping. The method determines that a propagation packet is a transaction of a cryptographic currency and extracts both an IP address and an input key-address to determine that the input key-address is under a suspected control of a user of interest. The method also determines that a relayed key-address communicated between a user of interest and a correspondent is under the suspected control of the user of interest, and/or that and/or an exhibited key-address of a web content is under the suspected control of the user of interest. The suspected control may be added to an enhanced ledger data and/or a user directory data. The system implementing one or more of the methods includes a set of collections servers, a directory server, and a wide area network.
1. A method, using a computer processor and a physical memory, comprising: determining that a propagation packet is a transaction of a cryptographic currency propagating across a network for integration into a peer-verification ledger based on identification within an application layer protocol of t
1. A method, using a computer processor and a physical memory, comprising: determining that a propagation packet is a transaction of a cryptographic currency propagating across a network for integration into a peer-verification ledger based on identification within an application layer protocol of the propagation packet at least one of: a magic number associated with a specific cryptographic currency, a byte size of the propagation packet, and a hash format associated with the specific cryptographic currency, the magic number located in a header field of the application layer protocol, and the transaction comprising a value transfer of the cryptographic currency between an input key-address of an input of the transaction and an output key-address of an output of the transaction;extracting an IP address from a TCP/IP layer of the propagation packet associated with the transaction;extracting, from the transaction, a transactional hash associated with the input of the transaction, the transactional hash referencing a previous output of a previous transaction;analyzing the peer-verification ledger to determine the input key-address associated with transactional hash referencing the previous output;extracting the input key-address of the input of the transaction of the cryptographic currency propagating across the network for integration into the peer-verification ledger;linking the IP address from the TCP/IP layer of the propagation packet with the input key-address of the input of the transaction;determining that the input key-address of the input of the transaction is under a suspected control of a user of interest based on an association between the user of interest and the IP address extracted from the TCP/IP layer of the propagation packet of the transaction;stratifying, within a user directory data, a designation of the suspected control of the input key-address of the input of the transaction into one or more designations of a provisional control and a designation of a verified control, based on a predetermined certainty of the association between the user of interest and the IP address extracted from the TCP/IP layer of the propagation packet of the transaction;determining that a point-to-point packet relayed between the user of interest and a correspondent of the user of interest is a key-bearing communication comprising a relayed key-address of the key-bearing communication, the key-bearing communication being at least one of an email, a chat note, a social media message, a text message and a voice call;extracting the relayed key-address of the key-bearing communication from the key-bearing communication;determining that the user directory data includes the relayed key-address of the key-bearing communication;when the user directory data does not include the relayed key-address of the key-bearing communication, creating a new entry for the relayed key-address within the user directory data;designating, within the user directory data, the relayed key-address of the key-bearing communication as under the suspected control of the user of interest;identifying the point-to-point packet as associated with the key-bearing communication based on at least one of a length of a character string of the relayed key-address of the key-bearing communication, a leading character of the character string of the relayed key-address of the key-bearing communication, and the character string of the relayed key-address of the key-bearing communication being a base-58 alpha-numeric format; andstratifying, within the user directory data, the designation of the suspected control of the relayed key-address of the key-bearing communication into the one or more designations of the provisional control and the designation of the verified control, based upon a predetermined certainty of an association between the user of interest and at least one of an IP address of the key-bearing communication extracted from the TCP/IP layer of the peer-to-peer packet and an online identity associated with a transmission of the key-bearing communication. 2. The method of claim 1, further comprising: determining that a web content comprises a key-bearing content having an exhibited key-address of the key-bearing content, wherein the key-bearing content is at least one of a markup language page, a forum post, an online cryptographic key directory entry, and a social media data;using a web-scraper, extracting the exhibited key-address of the key-bearing content from the key-bearing content; anddesignating, within the user directory data, the exhibited key-address of the key-bearing content as under the suspected control of the user of interest based on an association between an online identity responsible for creating the key-bearing content and the user of interest. 3. The method of claim 2, further comprising: consolidating a set of key-addresses within a control radius of the verified control of the user of interest into a crypto bank profile corresponding to the user of interest. 4. The method of claim 3, further comprising: verifying that the transaction has been incorporated into at least one of a forming unit of the peer-verification ledger and a confirmed unit of the peer-verification ledger, a majority of a set of pre-populated key-addresses within the user directory data being derived from a set of previous transactions of the peer-verification ledger. 5. The method of claim 4, further comprising: when a first key-address of a specific stratum of the provisional control of the user of interest and a second key-address of an unknown control are both used as the input of the transaction, designating, within the user directory data, the second key-address of the input of the transaction as under the specific stratum of the provisional control of the user of interest; andwhen a third key-address under a first stratum of the provisional control of the user of interest and a fourth key-address under a second stratum of the provisional control of the user of interest are both used as the input of the transaction, elevating the designation of the third key-address and the designation of the fourth key-address to be under at least one of the verified control and a third stratum of the provisional control closer in certainty to the verified control as measured by the control radius. 6. The method of claim 5, further comprising: determining, when the transaction has a first key-address of the output of the transaction and a second key-address of the output of the transaction, that the first key-address of the output of the transaction is a change key-address returning a portion of the value transfer of the transaction back to the user of interest associated with the input key-address of the input of the transaction,wherein the first key-address of the output of the transaction is identified as the change key-address by at least one of: determining that the value transfer to the second key-address of the output of the transaction is an approximate integer multiple of a unit of the cryptographic currency; anddetermining, when the second key-address of the output of the transaction is used as a next key-address of a new input of a later transaction, that traveling a distance between a geographic origin of the transaction and the later transaction would be physically impracticable for a suspected controller of both the second key-address of the output of the transaction and the next key-address of the new input of the later transaction within an elapse time of the transaction and the later transaction; anddesignating, within the user directory data, the change key-address as under the suspected control of the user of interest. 7. The method of claim 6, wherein the peer-verification ledger is a block chain data,wherein the forming unit is a forming block of the block chain data and the confirmed unit is a confirmed block of the block chain data,wherein the cryptographic currency is a bitcoin currency, andwherein the hash format is a string of twenty-seven to thirty-four base-58 alphanumeric characters beginning with at least one of a numeral “1” and a numeral “3”. 8. A method, using a computer processor and physical memory, comprising: determining that a propagation packet is a transaction of a cryptographic currency propagating across a network for integration into a peer-verification ledger, the transaction comprising a value transfer of the cryptographic currency between an input key-address of an input of the transaction and an output key-address of an output of the transaction;extracting an IP address from a TCP/IP layer of the propagation packet associated with the transaction;extracting, from the transaction, a transactional hash associated with the input of the transaction, the transactional hash referencing a previous output of a previous transaction;analyzing the peer-verification ledger to determine the input key-address associated with the transactional hash referencing the previous output;extracting the input key-address of the input of the transaction of the cryptographic currency propagating across the network for integration into the peer-verification ledger;linking the IP address from the TCP/IP layer of the propagation packet with the input key-address of the input of the transaction;designating, within an enhanced ledger data, the input key-address of the input of the transaction as under a suspected control of a user of interest based on an association between the user of interest and the IP address extracted from the TCP/IP layer of the propagation packet of the transaction;determining that a point-to-point packet relayed between the user of interest and a correspondent of the user of interest is a key-bearing communication comprising a relayed key-address of the key-bearing communication, the key-bearing communication being at least one of an email, a chat note, a social media message, a text message, and a voice call;extracting the relayed key-address of the key-bearing communication from the key-bearing communication;designating, within the enhanced ledger data, the relayed key-address of the key-bearing communication as under the suspected control of the user of interest;determining that a web content comprises a key-bearing content having an exhibited key-address of the key-bearing content, the key-bearing content being at least one of a markup language page, a forum post, an online cryptographic key directory entry, and a social media data;using a web-scraper, extracting the exhibited key-address of the key-bearing content from the key-bearing content; anddesignating, within the enhanced ledger data, the exhibited key-address of the key-bearing content as under the suspected control of the user of interest based on an association between an online identity responsible for creating the key-bearing content and the user of interest. 9. The method of claim 8, further comprising: stratifying, within the enhanced ledger data, a designation of the suspected control into one or more designations of a provisional control and a designation of a verified control, based upon a predetermined certainty of an association giving rise to the designation of the suspected control; andupdating a data set of the enhanced ledger data comprising a set of previously used key-addresses and a set of transactions in substantially real-time by referencing an active copy of the peer-verification ledger, the active copy of the peer-verification ledger being the same as is present in a cryptographic mining operation of the cryptographic currency. 10. A system comprising: a collection server associated with an access point and having a computer processor and a physical memory, to intercept an internet protocol packet determined by the collection server to have an association with at least one of a transaction of a cryptographic currency propagating across a network for integration into a peer-verification ledger and a key-bearing communication between a user of interest and a correspondent of the user of interest;an IP extraction module to extract an IP address from a TCP/IP layer of the propagation packet associated with the at least one of the transaction and the key-bearing communication;a key extraction module to extract at least one of a transactional hash of an input of the transaction of the cryptographic currency propagating across the network for integration into the peer-verification ledger and a relayed key-address of the key-bearing communication between the user of interest and the correspondent of the user of interest;the network;a cryptocurrency network;a directory server, to house at least one of a user directory data, an enhanced ledger data and a ledger copy data;a cryptographic node, to house an active copy of the peer-verification ledger as present in a cryptographic mining operation; anda control verification module, to stratify a designation of a suspected control into one or more designations of a provisional control and a designation of a verified control, based upon a predetermined certainty of an association giving rise to the designation of the suspected control. 11. The system of claim 10, wherein the directory server is further configured to: determine that a web content comprises a key-bearing content having an exhibited key-address of the key-bearing content, the key-bearing content being at least one of a markup language page, a forum post, an online cryptographic key directory entry, and a social media data,using a web-scraper, extract the exhibited key-address of the key-bearing content from the key-bearing content,designate, within the user directory data, the exhibited key-address of the key-bearing content as under the suspected control of the user of interest based on an association between an online identity responsible for creating the key-bearing content and the user of interest,consolidate a set of key-addresses within a control radius of the verified control of the user of interest into a crypto bank profile corresponding to the user of interest,verify that the transaction has been incorporated into at least one of a forming unit of the peer-verification ledger and a confirmed unit of the peer-verification ledger, a majority of a set of pre-populated key-addresses within the user directory data being derived from a set of previous transactions of the peer-verification ledger,when a first key-address of a specific stratum of the provisional control of the user of interest and a second key-address of an unknown control are both used as the input of the transaction, designate, within the user directory data, the second key-address of the input of the transaction as under the specific stratum of the provisional control of the user of interest, andwhen a third key-address under a first stratum of the provisional control of the user of interest and a fourth key-address under a second stratum of the provisional control of the user of interest are both used as the input of the transaction, elevate the designation of the third key-address and the designation of the fourth key-address to be under at least one of the verified control and a third stratum of the provisional control closer in certainty to the verified control as measured by the control radius. 12. The system of claim 11, wherein the directory server is further configured to: determine, when the transaction has a first key-address of an output of the transaction and a second key-address of the output of the transaction, that the first key-address of the output of the transaction is a change key-address returning a portion of a value transfer of the transaction back to the user of interest associated with an input key-address of the input of the transaction, wherein the first key-address of the output of the transaction is identified as the change key-address by at least one of: determining that the value transfer to the second key-address of the output of the transaction is an approximate integer multiple of a unit of the cryptographic currency, anddetermining, when the second key-address of the output of the transaction is used as a next key-address of a new input of a later transaction, that traveling a distance between a geographic origin of the transaction and the later transaction would be physically impracticable for a suspected controller of both the second key-address of the output of the transaction and the next key-address of the new input of the later transaction within an elapse time of the transaction and the later transaction, anddesignate, within the user directory data, the change key-address as under the suspected control of the user of interest, wherein the peer-verification ledger is a block chain data,wherein the forming unit is a forming block of the block chain data and the confirmed unit is a confirmed block of the block chain data,wherein the cryptographic currency is a bitcoin currency, andwherein a hash format of the cryptographic currency is a string of twenty-seven to thirty-four base-58 alphanumeric characters beginning with at least one of a numeral “1” and a numeral “3”.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.