Changeflow GovPing Banking & Finance Patent Application: Blockchain Block Propagatio...
Routine Notice Added Draft

Patent Application: Blockchain Block Propagation with Poisoned Transactions

Favicon for changeflow.com ChangeBridge: Patent Apps - Business Methods (G06Q)
Published December 1st, 2025
Detected March 26th, 2026
Email

Summary

The USPTO has published a patent application (US20260087493A1) detailing methods for block propagation in a blockchain network. The application describes techniques involving poisoned transactions and encrypted lists to identify invalid transactions, aiming to enhance network security and integrity.

What changed

This document is a published patent application (US20260087493A1) from the USPTO concerning blockchain technology. It outlines a method for block propagation where a mining node intentionally includes invalid transactions ('poisoned transactions') in a candidate block and provides an encrypted list to identify them. This approach aims to prevent other nodes from prematurely relying on the originating node's validation and to improve the overall security and efficiency of blockchain networks.

As this is a patent application, it does not impose immediate regulatory obligations. However, companies involved in blockchain development, cryptocurrency, or distributed ledger technology should be aware of this filing as it represents potential future technological advancements and intellectual property in the space. The application was filed on December 1, 2025, and published with an application number of 19405105.

Source document (simplified)

← USPTO Patent Applications

BLOCK PROPAGATION WITH POISONED TRANSACTIONS IN A BLOCKCHAIN NETWORK

Application US20260087493A1 Kind: A1 Mar 26, 2026

Inventors

Steven Patrick COUGHLAN

Abstract

Methods and devices for propagating blocks in a blockchain network. At a first mining node, while hashing a first block header of a first candidate block, the first mining node sends, to other mining nodes, a first message specifying transactions and their order in a first ordered set of transactions contained in the first candidate block. To prevent the other nodes from relying on the first mining node having validated the transactions in the candidate block, the first mining node seeds the first ordered set with one or more invalid transactions to create a poisoned ordered set, and provides an encrypted list identifying the invalid transactions. Once a proof-of-work is found for the candidate block, the first mining node provides a decryption key to decrypt the encrypted list and identify the invalid transactions. It may further provide replacement transactions for the invalid transactions.

CPC Classifications

G06Q 20/389 G06Q 20/401 H04L 9/3218 H04L 9/50

Filing Date

2025-12-01

Application No.

19405105

View original document →

Classification

Agency
USPTO
Published
December 1st, 2025
Instrument
Notice
Legal weight
Non-binding
Stage
Draft
Change scope
Minor
Document ID
US20260087493A1

Who this affects

Industry sector
5182 Data Processing & Hosting 5222 Fintech & Digital Assets
Activity scope
Blockchain Technology
Geographic scope
United States US

Taxonomy

Primary area
Financial Services
Operational domain
IT Security
Topics
Cybersecurity Technology

Get Banking & Finance alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when ChangeBridge: Patent Apps - Business Methods (G06Q) publishes new changes.

Optional. Personalizes your daily digest.

Free. Unsubscribe anytime.