Most blockchain projects registered with the United States Patent and Trademark Office are underdogs of the tech world. Some of them are being worked upon, some already have been implemented with brilliant use cases while others are still stranded in the initial stages of development.
The blockchain patents registered with USPTO gives out a very different vibe that I usually don’t get with other projects. The list of all the blockchain patents have one or two things in common such as decentralization, immutability, and transparency.
But one of the interesting projects that is based on a blockchain but does not have any of these features is the Rewritable blockchain. It is as ironic as it could get, but still shows the use case of a blockchain in one of its best forms.
The abstract of this blockchain elaborates on a system that includes “circuitry for rewriting blockchains in a validity-preserving operation”.
The immense advancement in electronics and communications have brought in an enormous amount of clientele, which has resulted in the widespread adoption of e-transactions and distributed ledger technologies. Bitcoin [BTC] displaced paper currency in billions of transactions that it conducted over the years. There’s a need to improvise the verification and recordation of electronic transactions that help operators to engage in e-transactions better.
- In some cases, using a key secret held by a trusted party. In some cases, the blockchain may include a series of blocks secured integrity codes that may prevent non-tamper-evident rewrites by non-trusted parties that are not in possession of the key secret. The key may also allow valid but tamper-evident rewrites of the blockchain by trusted entities.
- In some cases, integrity outputs may be generated from the integrity codes based on the content of the previous blocks in the series such that attempts by untrusted parties to replace a block may be detected through coding-inconsistencies with other blocks.
The patent was established for data verification, validation, and re-writing in complex real-world systems.
The patent even says that:
Op: When it comes to public blockchains of cryptocurrencies, it is extremely important to have decentralization as the very first feature to accelerate financial sovereignty. But as long as private blockchains are considered, it is important to know that immutability is not necessary for ever-changing businesses. They need to make changes for their system’s efficiency and accuracy which feeds the purpose of transparent storage of data.
This is something you can definitely do using Google excel sheets. The difference is, here you get to know the time, date and who the update was actually made by without risking the authenticity of it and without worrying about a malicious third party intervention.
Additionally, Blockchain rewrites may be used to perform low-level operations such as memory rewrites, deletions, and additions. Accordingly, the techniques and architectures can improve the operation of the underlying hardware of a computer system as the system may utilize blockchain protocols for storing data for which verifiability is implemented.
For instance, an OS software that secures system may be stored in blockchain payloads to protect the data from manipulation by malware, unauthorized parties, unauthorized devices, or other unintended/unauthorized alterations.
User behavior profile environment
Producers, manufacturers, and customer-oriented businesses lose a lot of data on their user’s behavior due to the lack of documentation of their behavior. They fail to improvise on their user experience and the mentality due to the lack of metrics. Such businesses can learn what a customer reacts to when they pop-up on their application or site. What makes them buy certain things, what doesn’t. What influences them and what makes them exit the site. All of this data – through one protocol.
User behavior profile environment patent registered with USPTO is one of the methods to generate a cyber profile behavior of the user which explains the interactions between the users and the information provider.
The technology further converts the behavior of the user into electronic data that represents the interactions through multi-layered formats wherein each layer consists of multi-layered information that is corresponding to a particular layer of user interaction.
Further, these generated layers of user behaviors a unique multi-dimensional cyber behavior profile based on the interactions stored on the electronic user profile.
Organizations often turn to technology to address threats that include malicious behavior of cybercriminals who have the legitimate rights to access and modify the company’s data. While the number of malicious users may be small (e.g., less than 0.1% of all users in an organization), they may wreak serious financial and other types of damage. Which is why companies implement machine learning and Ai approaches to identify what type of anomalous or malicious user behavior they’re facing.
What could fight this is basically:-
“A method, system, and computer-usable medium are disclosed for detecting acceptable, anomalous, and malicious user behavior. For purposes of this disclosure, an information handling system may include any instrumentality or aggregate of instrumentalities operable to compute, classify, process, transmit, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes.”
Op: We do live in an episode of black mirror. Every activity is tracked online and every move we make sets the path for our next move irrespective of our liking.
But one of the ways that impressed me is how a user profile environment can be saved using a blockchain wherein a company or its sisters understand the behavior of its audience which can be used to alter their needs, work differently towards their liking and could eliminate malicious attacks just by understanding its recorded behavior.
This particular solution can be used by companies under the oath of not distributing the particular data to anyone. Unless the security of this particular data is not maintained it adds risk to users more than it adds value to service providers.
Blockchain-based social media history maps
Blockchain usually is a digital data structure that facilitates recording digital information. More specifically, blockchains are designed to be resistant to modification of data once recorded and may not be altered retroactively. The abstract of this project is far more interesting than any. It states:
The transaction history controller may receive data representing a first online transaction for the second subscriber, format the data for the distributed blockchain database, store the formatted data as a new block in the second chain, receive a request to generate a trend report for a cluster of subscribers that includes the first and second subscribers, and generate the trend report dependent on the blocks in the first and second chains.
The online transactions that are captured with the aid of social media application, and for which information is saved inside the distributed blockchain database, may constitute any kind of online activity. Whether the transaction is explicitly or implicitly made on behalf of a person. For instance, online transactions for which information is stored inside the dispensed blockchain database might also consist of shopping behaviors, the posting of content material, attendance at occasions, or sincerely the presence of a user at a particular location. In well-known, any form of conduct or activity of a user may be captured as a “transaction” with the aid of a social media utility or a software application executing on a subscriber tool and represented by information in a block within the dispensed blockchain database.
Op: This project, in particular, brings in a new way of handling user data. It plays a very important role in applications who store data of their users, in this case, every action. With this type of data, one can generate a huge amount of analysis which can say a lot about the psychology of the user, its preferences, its dislikes and more. This further also helps in getting accurate advertisements on the user profile.
We – the team at TechMerge are constantly working towards our vision of providing information regarding emerging technologies at its most consolidated form. Never miss out on the latest updates and news, click the Red Bell located on the bottom right of your screen!