{"id":30212,"date":"2024-05-14T19:57:21","date_gmt":"2024-05-14T19:57:21","guid":{"rendered":"https:\/\/sagaciousresearch.com\/blog\/?p=30212"},"modified":"2024-07-26T07:05:49","modified_gmt":"2024-07-26T07:05:49","slug":"blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis","status":"publish","type":"post","link":"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis","title":{"rendered":"Blockchain Solutions for Ransomware and Phishing Attacks: A Patent Analysis"},"content":{"rendered":"\n<p>With over <a href=\"https:\/\/ransomware.org\/wp-content\/uploads\/2024\/03\/2024-State-of-Ransomware-Report_v1.pdf#:~:text=URL%3A%20https%3A%2F%2Fransomware.org%2Fwp\" target=\"_blank\" rel=\"noreferrer noopener\">317.59 million<\/a> attempts detected globally in 2023 alone\u200b, ransomware is a serious threat to businesses all over the world. Leveraging blockchain technology can help organisations counter this increasing threat by strengthening defences against these cyber attacks, including phishing attack. Let\u2019s look into innovative <a href=\"https:\/\/sagaciousresearch.com\/blog\/blockchain-patent-filing-trends-impact-ip\/\" target=\"_blank\" rel=\"noreferrer noopener\">blockchain-based solutions patented<\/a> by leading technology companies, focusing on their applications in bolstering ransomware resilience and mitigating phishing attack.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_81 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-6a04b380a4449\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-6a04b380a4449\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\/#How_Blockchain_Enhances_Ransomware_Resilience\" >How Blockchain Enhances Ransomware Resilience<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\/#IBMs_Immutable_Data_Storage_Patent_US10820594B1\" >IBM&#8217;s Immutable Data Storage (Patent US10820594B1)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\/#Microsofts_Secure_Backup_and_Recovery_Patent_US10785923B2\" >Microsoft\u2019s Secure Backup and Recovery (Patent US10785923B2)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\/#Chainalysiss_Ransomware_Detection_Framework_Patent_US10829373B1\" >Chainalysis\u2019s Ransomware Detection Framework (Patent US10829373B1)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\/#Accentures_Decentralised_Identity_Management_Patent_US10876148B2\" >Accenture\u2019s Decentralised Identity Management (Patent US10876148B2)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\/#Guardtimes_Immutable_Data_Timestamping_Patent_US10816305B2\" >Guardtime\u2019s Immutable Data Timestamping (Patent US10816305B2)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\/#Intels_Secure_Hardware_Integration_US10785919B1\" >Intel\u2019s Secure Hardware Integration (US10785919B1)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\/#Having_Queries_Contact_Us_Now\" >Having Queries? Contact Us Now!<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_Blockchain_Enhances_Ransomware_Resilience\"><\/span><strong>How Blockchain Enhances Ransomware Resilience<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><a href=\"https:\/\/sagaciousresearch.com\/blog\/a-short-beginners-guide-to-blockchain-technology\/\" target=\"_blank\" rel=\"noreferrer noopener\">Blockchain technology<\/a> offers unique features that make it an effective tool against ransomware threats:<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>Decentralisation: With data spread among a number of nodes in a network, ransomware and phishing attack finds it more difficult to infect an entire system and there is less chance of a single point of failure.<\/li>\n\n\n\n<li>Immutability: Once recorded on a blockchain, one cannot change or remove data.. This is an essential defence against ransomware that tries to encrypt or alter data since it guarantees data integrity and stops illegal modifications.<\/li>\n\n\n\n<li>Transparency: The transparent blockchain ledger enables real-time transaction monitoring, facilitating the early identification of potential ransomware-related behavior and phishing attack.<\/li>\n\n\n\n<li>Security: The strong security offered by blockchain&#8217;s cryptographic algorithms guards against manipulation and unwanted access to data.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"IBMs_Immutable_Data_Storage_Patent_US10820594B1\"><\/span><strong>IBM&#8217;s Immutable Data Storage (Patent US10820594B1)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>IBM&#8217;s Immutable Data Storage utilizes blockchain technology to ensure the availability and integrity of vital data assets. Data alteration and illegal access are two of the most important problems that ransomware presents, and this solution deals with those issues.<\/p>\n\n\n\n<p><strong>Key Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Decentralised Ledger: Information kept on a blockchain prevents tampering and allows for immutability.<\/li>\n\n\n\n<li>Enhanced Data Integrity: Prevents ransomware from encrypting or erasing crucial data by guaranteeing that once data is written, it cannot be changed.<\/li>\n<\/ul>\n\n\n\n<p><strong>Impact on Ransomware Resilience<\/strong><\/p>\n\n\n\n<p>IBM&#8217;s approach greatly reduces the danger of data tampering by improving data integrity and decentralising data storage. This method makes sure that even in the face of highly skilled ransomware operations, important data is accessible and unaffected by phishing attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Microsofts_Secure_Backup_and_Recovery_Patent_US10785923B2\"><\/span><strong>Microsoft\u2019s Secure Backup and Recovery (Patent US10785923B2)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>With the help of <a href=\"https:\/\/sagaciousresearch.com\/blog\/patent-filing-trends-associated-with-power-dissipation-in-blockchain\/\" target=\"_blank\" rel=\"noreferrer noopener\">blockchain technology<\/a>, Microsoft&#8217;s proprietary solution creates safe, unchangeable backups that guarantee data availability for post-ransomware recovery.<\/p>\n\n\n\n<p><strong>Key Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Blockchain-Based Backups: The blockchain network keeps backups, ensuring that alteration is impossible.<\/li>\n\n\n\n<li>Secure Recovery Mechanisms: Guarantees that backup data is recoverable and stays undamaged.<\/li>\n<\/ul>\n\n\n\n<p><strong>Impact on Ransomware Resilience<\/strong><\/p>\n\n\n\n<p>This technology&#8217;s strong backup option ensures that businesses can promptly restore data in the event of a ransomware attack. The blockchain&#8217;s built-in security mechanisms maintain data availability by preventing backups from compromised.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Chainalysiss_Ransomware_Detection_Framework_Patent_US10829373B1\"><\/span><strong>Chainalysis\u2019s Ransomware Detection Framework (Patent US10829373B1)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The technology offered by Chainalysis creates a complex framework for detecting ransomware by utilising pattern recognition and blockchain-based transaction analysis.<\/p>\n\n\n\n<p><strong>Key Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Real-Time Transaction Monitoring: This feature examines blockchain transactions to look for unusual trends that could point to ransomware.<\/li>\n\n\n\n<li>Pattern Recognition: Recognizes payments made by ransomware and associated actions beforehand.<\/li>\n<\/ul>\n\n\n\n<p><strong>Impact on Ransomware Resilience<\/strong><\/p>\n\n\n\n<p>This methodology minimises operational disruptions and financial losses by enabling early identification of ransomware activity and enabling enterprises to respond proactively to phishing attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Accentures_Decentralised_Identity_Management_Patent_US10876148B2\"><\/span><strong>Accenture\u2019s Decentralised Identity Management (Patent US10876148B2)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>With the goal of securing authentication procedures, Accenture&#8217;s proprietary technology offers a decentralised identity management solution powered by <a href=\"https:\/\/sagaciousresearch.com\/blog\/decoding-wipo-proof-a-proxy-to-blockchain\/\" target=\"_blank\" rel=\"noreferrer noopener\">blockchain<\/a>.<\/p>\n\n\n\n<p><strong>Key Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identity Verification Using Blockchain Technology: This guarantees safe and unhackable user authentication.<\/li>\n\n\n\n<li>Enhanced Access Control: Keeps sensitive information and systems safe from unwanted access.<\/li>\n<\/ul>\n\n\n\n<p><strong>Impact on Ransomware Resilience<\/strong><\/p>\n\n\n\n<p>This solution lessens the possibility of ransomware attacks that take advantage of credentials that have been compromised, mitigating the risk of phishing attack by enhancing identity verification and access control.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Guardtimes_Immutable_Data_Timestamping_Patent_US10816305B2\"><\/span><strong>Guardtime\u2019s Immutable Data Timestamping (Patent US10816305B2)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Blockchain technology is used by Guardtime&#8217;s solution to immutably timestamp data, guaranteeing the validity and integrity of digital assets.<\/p>\n\n\n\n<p><strong>Key Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Blockchain Anchoring: Enables data on a blockchain to be tamper-evident by timestamping it.<\/li>\n\n\n\n<li>Integrity Verification: Identifies any alterations to digital assets that are not authorised.<\/li>\n<\/ul>\n\n\n\n<p><strong>Impact on Ransomware Resilience<\/strong><\/p>\n\n\n\n<p>By offering a dependable way to confirm data integrity, this technology aids businesses in identifying and countering ransomware tampering attempts and phishing attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Intels_Secure_Hardware_Integration_US10785919B1\"><\/span><strong>Intel\u2019s Secure Hardware Integration (US10785919B1)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>To protect data on hardware devices, Intel&#8217;s unique approach combines blockchain technology with secure hardware methods.<\/p>\n\n\n\n<p><strong>Key Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Blockchain-Enhanced Security: This integrates blockchain protocols with hardware elements.<\/li>\n\n\n\n<li>Endpoint Protection: Guards against ransomware assaults on data kept on hardware.<\/li>\n<\/ul>\n\n\n\n<p><strong>Impact on Ransomware Resilience<\/strong><\/p>\n\n\n\n<p>This solution lowers the likelihood of ransomware taking advantage of hardware flaws by protecting susceptible endpoints through the enhancement of hardware security with blockchain.<\/p>\n\n\n\n<p>Harnessing blockchain technology provides a powerful toolset for enhancing ransomware resilience. The patented solutions from IBM, Microsoft, Chainalysis, Accenture, Guardtime, and Intel exemplify the innovative approaches being developed to safeguard data integrity, ensure secure backups, detect ransomware activity, and protect user identities and hardware. As ransomware threats evolve, these blockchain-based technologies offer a robust defence, helping organisations maintain the security and availability of their critical data assets.<\/p>\n\n\n\n<p><strong>\u2013&nbsp;<em>By The Editorial Team<\/em><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Having_Queries_Contact_Us_Now\"><\/span>Having Queries? Contact Us Now!<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\nvar gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),document.addEventListener(\"gform\/theme\/scripts_loaded\",function(){gform.themeScriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>\"function\"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn(\"The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1.\"),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener(\"gform_main_scripts_loaded\",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener(\"gform\/theme\/scripts_loaded\",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener(\"DOMContentLoaded\",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook(\"action\",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook(\"filter\",o,r,e,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,r){gform.removeHook(\"action\",o,r)},removeFilter:function(o,r,e){gform.removeHook(\"filter\",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+\"_\"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==r?t.apply(null,e):e[0]=t.apply(null,e)})),\"filter\"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});\n\/* ]]> *\/\n<\/script>\n\n                <div class='gf_browser_gecko gform_wrapper gravity-theme gform-theme--no-framework' data-form-theme='gravity-theme' data-form-index='0' id='gform_wrapper_203' >\n                        <div class='gform_heading'>\n\t\t\t\t\t\t\t<p class='gform_required_legend'>&quot;<span class=\"gfield_required gfield_required_asterisk\">*<\/span>&quot; indicates required fields<\/p>\n                        <\/div><form method='post' enctype='multipart\/form-data'  id='gform_203'  action='\/blog\/wp-json\/wp\/v2\/posts\/30212' data-formid='203' novalidate>\n                        <div class='gform-body gform_body'><div id='gform_fields_203' class='gform_fields top_label form_sublabel_below description_below validation_below'><div id=\"field_203_15\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gfield--width-full gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_15' id='input_203_15' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='' \/><\/div><\/div><div id=\"field_203_1\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_203_1'>Last Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_1' id='input_203_1' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_203_12\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_203_12'>First Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_12' id='input_203_12' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_203_8\" class=\"gfield gfield--type-email gfield--input-type-email gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_203_8'>Your Work Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_8' id='input_203_8' type='email' value='' class='large'    aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><div id=\"field_203_9\" class=\"gfield gfield--type-phone gfield--input-type-phone gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_203_9'>Phone Number with Country Code<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_phone'><input name='input_9' id='input_203_9' type='tel' value='' class='large'   aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_203_17\" class=\"gfield gfield--type-select gfield--input-type-select gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_203_17'>Country<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_select'><select name='input_17' id='input_203_17' class='large gfield_select'    aria-required=\"true\" aria-invalid=\"false\" ><option value='' >Please Select Country<\/option><option value='United States' >United States<\/option><option value='Canada' >Canada<\/option><option value='United Kingdom' >United Kingdom<\/option><option value='China' >China<\/option><option value='India' >India<\/option><option value='North Korea' >North Korea<\/option><option value='South korea' >South korea<\/option><option value='United Arab Emirates' >United Arab Emirates<\/option><option value='Afghanistan' >Afghanistan<\/option><option value='Albania' >Albania<\/option><option value='Algeria' >Algeria<\/option><option value='Andorra' >Andorra<\/option><option value='Angola' >Angola<\/option><option value='Antigua and Barbuda' >Antigua and Barbuda<\/option><option value='Argentina' >Argentina<\/option><option value='Armenia' >Armenia<\/option><option value='Australia' >Australia<\/option><option value='Austria' >Austria<\/option><option value='Azerbaijan' >Azerbaijan<\/option><option value='The Bahamas' >The Bahamas<\/option><option value='Bahrain' >Bahrain<\/option><option value='Bangladesh' >Bangladesh<\/option><option value='Barbados' >Barbados<\/option><option value='Belarus' >Belarus<\/option><option value='Belgium' >Belgium<\/option><option value='Belize' >Belize<\/option><option value='Benin' >Benin<\/option><option value='Bhutan' >Bhutan<\/option><option value='Bolivia' >Bolivia<\/option><option value='Bosnia and Herzegovina' >Bosnia and Herzegovina<\/option><option value='Botswana' >Botswana<\/option><option value='Brazil' >Brazil<\/option><option value='Brunei' >Brunei<\/option><option value='Bulgaria' >Bulgaria<\/option><option value='Burkina Faso' >Burkina Faso<\/option><option value='Burundi' >Burundi<\/option><option value='Cabo Verde' >Cabo Verde<\/option><option value='Cambodia' >Cambodia<\/option><option value='Cameroon' >Cameroon<\/option><option value='Central African Republic' >Central African Republic<\/option><option value='Chad' >Chad<\/option><option value='Chile' >Chile<\/option><option value='Colombia' >Colombia<\/option><option value='Comoros' >Comoros<\/option><option value='Congo' >Congo<\/option><option value='Costa Rica' >Costa Rica<\/option><option value='C\u00f4te d\u2019Ivoire' >C\u00f4te d\u2019Ivoire<\/option><option value='Croatia' >Croatia<\/option><option value='Cuba' >Cuba<\/option><option value='Cyprus' >Cyprus<\/option><option value='Czech Republic' >Czech Republic<\/option><option value='Denmark' >Denmark<\/option><option value='Djibouti' >Djibouti<\/option><option value='Dominica' >Dominica<\/option><option value='Dominican Republic' >Dominican Republic<\/option><option value='East Timor (Timor-Leste)' >East Timor (Timor-Leste)<\/option><option value='Ecuador' >Ecuador<\/option><option value='Egypt' >Egypt<\/option><option value='El Salvador' >El Salvador<\/option><option value='Equatorial Guinea' >Equatorial Guinea<\/option><option value='Eritrea' >Eritrea<\/option><option value='Estonia' >Estonia<\/option><option value='Eswatini' >Eswatini<\/option><option value='Ethiopia' >Ethiopia<\/option><option value='Fiji' >Fiji<\/option><option value='Finland' >Finland<\/option><option value='France' >France<\/option><option value='Gabon' >Gabon<\/option><option value='The Gambia' >The Gambia<\/option><option value='Georgia' >Georgia<\/option><option value='Germany' >Germany<\/option><option value='Ghana' >Ghana<\/option><option value='Greece' >Greece<\/option><option value='Grenada' >Grenada<\/option><option value='Guatemala' >Guatemala<\/option><option value='Guinea' >Guinea<\/option><option value='Guinea-Bissau' >Guinea-Bissau<\/option><option value='Guyana' >Guyana<\/option><option value='Haiti' >Haiti<\/option><option value='Honduras' >Honduras<\/option><option value='Hungary' >Hungary<\/option><option value='Iceland' >Iceland<\/option><option value='Indonesia' >Indonesia<\/option><option value='Iran' >Iran<\/option><option value='Iraq' >Iraq<\/option><option value='Ireland' >Ireland<\/option><option value='Israel' >Israel<\/option><option value='Italy' >Italy<\/option><option value='Jamaica' >Jamaica<\/option><option value='Japan' >Japan<\/option><option value='Jordan' >Jordan<\/option><option value='Kazakhstan' >Kazakhstan<\/option><option value='Kenya' >Kenya<\/option><option value='Kiribati' >Kiribati<\/option><option value='Kosovo' >Kosovo<\/option><option value='Kuwait' >Kuwait<\/option><option value='Kyrgyzstan' >Kyrgyzstan<\/option><option value='Laos' >Laos<\/option><option value='Latvia' >Latvia<\/option><option value='Lebanon' >Lebanon<\/option><option value='Lesotho' >Lesotho<\/option><option value='Liberia' >Liberia<\/option><option value='Libya' >Libya<\/option><option value='Liechtenstein' >Liechtenstein<\/option><option value='Lithuania' >Lithuania<\/option><option value='Luxembourg' >Luxembourg<\/option><option value='Madagascar' >Madagascar<\/option><option value='Malawi' >Malawi<\/option><option value='Malaysia' >Malaysia<\/option><option value='Maldives' >Maldives<\/option><option value='Mali' >Mali<\/option><option value='Malta' >Malta<\/option><option value='Marshall Islands' >Marshall Islands<\/option><option value='Mauritania' >Mauritania<\/option><option value='Mauritius' >Mauritius<\/option><option value='Mexico' >Mexico<\/option><option value='Micronesia' >Micronesia<\/option><option value='Moldova' >Moldova<\/option><option value='Monaco' >Monaco<\/option><option value='Mongolia' >Mongolia<\/option><option value='Montenegro' >Montenegro<\/option><option value='Morocco' >Morocco<\/option><option value='Mozambique' >Mozambique<\/option><option value='Myanmar (Burma)' >Myanmar (Burma)<\/option><option value='Namibia' >Namibia<\/option><option value='Nauru' >Nauru<\/option><option value='Nepal' >Nepal<\/option><option value='Netherlands' >Netherlands<\/option><option value='New Zealand' >New Zealand<\/option><option value='Nicaragua' >Nicaragua<\/option><option value='Niger' >Niger<\/option><option value='Nigeria' >Nigeria<\/option><option value='North Macedonia' >North Macedonia<\/option><option value='Norway' >Norway<\/option><option value='Oman' >Oman<\/option><option value='Pakistan' >Pakistan<\/option><option value='Palau' >Palau<\/option><option value='Panama' >Panama<\/option><option value='Papua New Guinea' >Papua New Guinea<\/option><option value='Paraguay' >Paraguay<\/option><option value='Peru' >Peru<\/option><option value='Philippines' >Philippines<\/option><option value='Poland' >Poland<\/option><option value='Portugal' >Portugal<\/option><option value='Qatar' >Qatar<\/option><option value='Romania' >Romania<\/option><option value='Russia' >Russia<\/option><option value='Rwanda' >Rwanda<\/option><option value='Saint Kitts and Nevis' >Saint Kitts and Nevis<\/option><option value='Saint Lucia' >Saint Lucia<\/option><option value='Saint Vincent and the Grenadines' >Saint Vincent and the Grenadines<\/option><option value='Samoa' >Samoa<\/option><option value='San Marino' >San Marino<\/option><option value='Sao Tome and Principe' >Sao Tome and Principe<\/option><option value='Saudi Arabia' >Saudi Arabia<\/option><option value='Senegal' >Senegal<\/option><option value='Serbia' >Serbia<\/option><option value='Seychelles' >Seychelles<\/option><option value='Sierra Leone' >Sierra Leone<\/option><option value='Singapore' >Singapore<\/option><option value='Slovakia' >Slovakia<\/option><option value='Slovenia' >Slovenia<\/option><option value='Solomon Islands' >Solomon Islands<\/option><option value='Somalia' >Somalia<\/option><option value='South Africa' >South Africa<\/option><option value='Spain' >Spain<\/option><option value='Sri Lanka' >Sri Lanka<\/option><option value='Sudan' >Sudan<\/option><option value='South Sudan' >South Sudan<\/option><option value='Suriname' >Suriname<\/option><option value='Sweden' >Sweden<\/option><option value='Switzerland' >Switzerland<\/option><option value='Syria' >Syria<\/option><option value='Taiwan' >Taiwan<\/option><option value='Tajikistan' >Tajikistan<\/option><option value='Tanzania' >Tanzania<\/option><option value='Thailand' >Thailand<\/option><option value='Togo' >Togo<\/option><option value='Tonga' >Tonga<\/option><option value='Trinidad and Tobago' >Trinidad and Tobago<\/option><option value='Tunisia' >Tunisia<\/option><option value='Turkey' >Turkey<\/option><option value='Turkmenistan' >Turkmenistan<\/option><option value='Tuvalu' >Tuvalu<\/option><option value='Uganda' >Uganda<\/option><option value='Ukraine' >Ukraine<\/option><option value='Uruguay' >Uruguay<\/option><option value='Uzbekistan' >Uzbekistan<\/option><option value='Vanuatu' >Vanuatu<\/option><option value='Vatican City' >Vatican City<\/option><option value='Venezuela' >Venezuela<\/option><option value='Vietnam' >Vietnam<\/option><option value='Yemen' >Yemen<\/option><option value='Zambia' >Zambia<\/option><option value='Zimbabwe' >Zimbabwe<\/option><\/select><\/div><\/div><div id=\"field_203_10\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_203_10'>Company Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_10' id='input_203_10' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_203_18\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_203_18'>Job Title<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_18' id='input_203_18' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><fieldset id=\"field_203_13\" class=\"gfield gfield--type-checkbox gfield--type-choice gfield--input-type-checkbox gfield--width-half field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Register for Exclusive Webinar Series<\/legend><div class='ginput_container ginput_container_checkbox'><div class='gfield_checkbox ' id='input_203_13'><div class='gchoice gchoice_203_13_1'>\n\t\t\t\t\t\t\t\t<input class='gfield-choice-input' name='input_13.1' type='checkbox'  value='Yes, I want to register.'  id='choice_203_13_1'   \/>\n\t\t\t\t\t\t\t\t<label for='choice_203_13_1' id='label_203_13_1' class='gform-field-label gform-field-label--type-inline'>Yes, I want to register.<\/label>\n\t\t\t\t\t\t\t<\/div><\/div><\/div><\/fieldset><div id=\"field_203_16\" class=\"gfield gfield--type-textarea gfield--input-type-textarea gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_203_16'>Message (if any)<\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_16' id='input_203_16' class='textarea small'      aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><fieldset id=\"field_203_7\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield_contains_required field_sublabel_below gfield--has-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Consent<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/legend><div class='ginput_container ginput_container_consent'><input name='input_7.1' id='input_203_7_1' type='checkbox' value='1'  aria-describedby=\"gfield_consent_description_203_7\" aria-required=\"true\" aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_203_7_1' >I agree to the <a href=\"https:\/\/sagaciousresearch.com\/privacy-policy\/\"target=\"_blank\">privacy policy.  <\/a><\/label><input type='hidden' name='input_7.2' value='I agree to the &lt;a href=&quot;https:\/\/sagaciousresearch.com\/privacy-policy\/&quot;target=&quot;_blank&quot;&gt;privacy policy.  &lt;\/a&gt;' class='gform_hidden' \/><input type='hidden' name='input_7.3' value='198' class='gform_hidden' \/><\/div><div class='gfield_description gfield_consent_description' id='gfield_consent_description_203_7' tabindex='0'>By clicking the submit button, you give Sagacious IP consent to store and process the personal information submitted above. Sagacious IP is committed to protecting and respecting your privacy, we'll only use your information to provide the products and services you requested from us.<\/div><\/fieldset><\/div><\/div>\n        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_203' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit'  \/> \n            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_203' value='postback' \/>\n            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_203' id='gform_theme_203' value='gravity-theme' \/>\n            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_203' id='gform_style_settings_203' value='[]' \/>\n            <input type='hidden' class='gform_hidden' name='is_submit_203' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='203' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='USD' value='dnIKIG4Xu5IJvopYYocXpUtNP1k9O73RFCXbIPN2E0MPlXOxEPn4IHqWXsFOSRW9BM0Z37XuM9am2TwDXmRyQAUfGzXN0HB0MAXVVnfZEhdfjQ8=' \/>\n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_203' value='WyJ7XCI3LjFcIjpcImNkMWM3OWMwMDEzNGIzMmE2M2U0YWZjMzA0NWUwZjc5XCIsXCI3LjJcIjpcIjRjMTYxMzVmMTQ0MWExZDQzYjdjYTA4YzA4OTAzMDZkXCIsXCI3LjNcIjpcIjQ2MGQ1NzFhMGI2NTA5MTU2NTViOTVhNzIyNTEzYzAwXCJ9IiwiNjBlNjJlYjJkNjQ3NzIyZTM3NTcyOThkNjJkMGUxNDQiXQ==' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_203' id='gform_target_page_number_203' value='0' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_203' id='gform_source_page_number_203' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n gform.initializeOnLoaded( function() {gformInitSpinner( 203, 'https:\/\/sagaciousresearch.com\/blog\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_203').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_203');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_203').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_203').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_203').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_203').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_203').val();gformInitSpinner( 203, 'https:\/\/sagaciousresearch.com\/blog\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [203, current_page]);window['gf_submitting_203'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_203').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [203]);window['gf_submitting_203'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_203').text());}else{jQuery('#gform_203').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger(\"gform_pre_post_render\", [{ formId: \"203\", currentPage: \"current_page\", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( \"gform_wrapper_203\" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( \"span\" );            visibilitySpan.id = \"gform_visibility_test_203\";            gformWrapperDiv.insertAdjacentElement( \"afterend\", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( \"gform_visibility_test_203\" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 203, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} ); \n\/* ]]> *\/\n<\/script>\n\n","protected":false},"excerpt":{"rendered":"<p>With over 317.59 million attempts detected globally in 2023 alone\u200b, ransomware is a serious threat to businesses all over the world. Leveraging blockchain technology can help organisations counter this increasing threat by strengthening defences&#46;&#46;&#46;<\/p>\n","protected":false},"author":155,"featured_media":30277,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[],"coauthors":[1160],"class_list":["post-30212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blockchain Patents Combat Ransomware &amp; Phishing Attack<\/title>\n<meta name=\"description\" content=\"Leran how blockchain patents combat ransomware and phishing attack. Discover key technologies and their impact on cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blockchain Patents Combat Ransomware &amp; Phishing Attack\" \/>\n<meta property=\"og:description\" content=\"Leran how blockchain patents combat ransomware and phishing attack. Discover key technologies and their impact on cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\" \/>\n<meta property=\"og:site_name\" content=\"Sagacious IP\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-14T19:57:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-26T07:05:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware-resilience-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2100\" \/>\n\t<meta property=\"og:image:height\" content=\"1400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Editorial Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Editorial Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#article\",\"isPartOf\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\"},\"author\":{\"name\":\"The Editorial Team\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/person\/c80d7ff8b0d0cbb070cd2a7ef50d44a5\"},\"headline\":\"Blockchain Solutions for Ransomware and Phishing Attacks: A Patent Analysis\",\"datePublished\":\"2024-05-14T19:57:21+00:00\",\"dateModified\":\"2024-07-26T07:05:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\"},\"wordCount\":839,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware-resilience-1.jpg\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\",\"url\":\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\",\"name\":\"Blockchain Patents Combat Ransomware & Phishing Attack\",\"isPartOf\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware-resilience-1.jpg\",\"datePublished\":\"2024-05-14T19:57:21+00:00\",\"dateModified\":\"2024-07-26T07:05:49+00:00\",\"description\":\"Leran how blockchain patents combat ransomware and phishing attack. Discover key technologies and their impact on cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#primaryimage\",\"url\":\"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware-resilience-1.jpg\",\"contentUrl\":\"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware-resilience-1.jpg\",\"width\":2100,\"height\":1400,\"caption\":\"ransomware-resilience\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sagaciousresearch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blockchain Solutions for Ransomware and Phishing Attacks: A Patent Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#website\",\"url\":\"https:\/\/sagaciousresearch.com\/blog\/\",\"name\":\"Sagacious IP\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sagaciousresearch.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#organization\",\"name\":\"Sagacious IP\",\"url\":\"https:\/\/sagaciousresearch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2022\/06\/cropped-cropped-cropped-sagacious-ip-logo80-1-1.png\",\"contentUrl\":\"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2022\/06\/cropped-cropped-cropped-sagacious-ip-logo80-1-1.png\",\"width\":481,\"height\":80,\"caption\":\"Sagacious IP\"},\"image\":{\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/person\/c80d7ff8b0d0cbb070cd2a7ef50d44a5\",\"name\":\"The Editorial Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/person\/image\/11dede679472adad6ec842cdc3a81eec\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a1f18ebc998fca526616e9078165ea70ee6b34a4f3d04a76fe55890c17404638?s=96&d=initials&r=g&initials=in\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a1f18ebc998fca526616e9078165ea70ee6b34a4f3d04a76fe55890c17404638?s=96&d=initials&r=g&initials=in\",\"caption\":\"The Editorial Team\"},\"url\":\"https:\/\/sagaciousresearch.com\/blog\/author\/the-editorial-team\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blockchain Patents Combat Ransomware & Phishing Attack","description":"Leran how blockchain patents combat ransomware and phishing attack. Discover key technologies and their impact on cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis","og_locale":"en_US","og_type":"article","og_title":"Blockchain Patents Combat Ransomware & Phishing Attack","og_description":"Leran how blockchain patents combat ransomware and phishing attack. Discover key technologies and their impact on cybersecurity.","og_url":"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis","og_site_name":"Sagacious IP","article_published_time":"2024-05-14T19:57:21+00:00","article_modified_time":"2024-07-26T07:05:49+00:00","og_image":[{"width":2100,"height":1400,"url":"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware-resilience-1.jpg","type":"image\/jpeg"}],"author":"The Editorial Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"The Editorial Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#article","isPartOf":{"@id":"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis"},"author":{"name":"The Editorial Team","@id":"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/person\/c80d7ff8b0d0cbb070cd2a7ef50d44a5"},"headline":"Blockchain Solutions for Ransomware and Phishing Attacks: A Patent Analysis","datePublished":"2024-05-14T19:57:21+00:00","dateModified":"2024-07-26T07:05:49+00:00","mainEntityOfPage":{"@id":"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis"},"wordCount":839,"commentCount":0,"publisher":{"@id":"https:\/\/sagaciousresearch.com\/blog\/#organization"},"image":{"@id":"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#primaryimage"},"thumbnailUrl":"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware-resilience-1.jpg","articleSection":["Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis","url":"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis","name":"Blockchain Patents Combat Ransomware & Phishing Attack","isPartOf":{"@id":"https:\/\/sagaciousresearch.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#primaryimage"},"image":{"@id":"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#primaryimage"},"thumbnailUrl":"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware-resilience-1.jpg","datePublished":"2024-05-14T19:57:21+00:00","dateModified":"2024-07-26T07:05:49+00:00","description":"Leran how blockchain patents combat ransomware and phishing attack. Discover key technologies and their impact on cybersecurity.","breadcrumb":{"@id":"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#primaryimage","url":"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware-resilience-1.jpg","contentUrl":"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2024\/05\/ransomware-resilience-1.jpg","width":2100,"height":1400,"caption":"ransomware-resilience"},{"@type":"BreadcrumbList","@id":"https:\/\/sagaciousresearch.com\/blog\/blockchain-solutions-ransomware-and-phishing-attacks-patent-analysis#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sagaciousresearch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Blockchain Solutions for Ransomware and Phishing Attacks: A Patent Analysis"}]},{"@type":"WebSite","@id":"https:\/\/sagaciousresearch.com\/blog\/#website","url":"https:\/\/sagaciousresearch.com\/blog\/","name":"Sagacious IP","description":"Blog","publisher":{"@id":"https:\/\/sagaciousresearch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sagaciousresearch.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sagaciousresearch.com\/blog\/#organization","name":"Sagacious IP","url":"https:\/\/sagaciousresearch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2022\/06\/cropped-cropped-cropped-sagacious-ip-logo80-1-1.png","contentUrl":"https:\/\/sagaciousresearch.com\/blog\/wp-content\/uploads\/2022\/06\/cropped-cropped-cropped-sagacious-ip-logo80-1-1.png","width":481,"height":80,"caption":"Sagacious IP"},"image":{"@id":"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/person\/c80d7ff8b0d0cbb070cd2a7ef50d44a5","name":"The Editorial Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sagaciousresearch.com\/blog\/#\/schema\/person\/image\/11dede679472adad6ec842cdc3a81eec","url":"https:\/\/secure.gravatar.com\/avatar\/a1f18ebc998fca526616e9078165ea70ee6b34a4f3d04a76fe55890c17404638?s=96&d=initials&r=g&initials=in","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a1f18ebc998fca526616e9078165ea70ee6b34a4f3d04a76fe55890c17404638?s=96&d=initials&r=g&initials=in","caption":"The Editorial Team"},"url":"https:\/\/sagaciousresearch.com\/blog\/author\/the-editorial-team"}]}},"_links":{"self":[{"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/posts\/30212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/users\/155"}],"replies":[{"embeddable":true,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/comments?post=30212"}],"version-history":[{"count":19,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/posts\/30212\/revisions"}],"predecessor-version":[{"id":30751,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/posts\/30212\/revisions\/30751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/media\/30277"}],"wp:attachment":[{"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/media?parent=30212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/categories?post=30212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/tags?post=30212"},{"taxonomy":"categories","embeddable":true,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/categories?post=30212"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sagaciousresearch.com\/blog\/wp-json\/wp\/v2\/coauthors?post=30212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}