G06F15/16

Methods and devices in a blockchain network

A first network device for use in a blockchain network is described. The first network device comprises means for, while carrying out a first iteration of a consensus protocol involving a second node device (103), in response to a trigger event (3040), obtaining a time interval function of a time interval start trigger event (3040) and of a time interval end trigger event (3080), each event being linked to a message of the consensus protocol and wherein at least the end trigger event (3080) comprises receiving a message from the second node device; means for transmitting (3083) first data (Delay_102) representative of said time interval to said second node device; means for, during a subsequent iteration of said consensus protocol involving said second node device, receiving a message (3140) from said second node device, said message containing second data (DelayTX_102) representative of said time interval from said second node device; means for authenticating said second node device as a function of said second data. A second network device, methods at the first and second network devices and a computer readable medium with code for carrying out the methods are also described.

System and method for optimizing network topology in a virtual computing environment
11579913 · 2023-02-14 · ·

A computer network optimization methodology is disclosed. In a computer-implemented method, components of a computing environment are automatically monitored, and have a feature selection analysis performed thereon. Provided the feature selection analysis determines that features of the components are in frequent communication and generating network latency. Provided the feature selection analysis determines that features of the components are not well defined, a similarity analysis of the features is performed. Results of the feature selection methodology are generated, and the components involved in the network traffic latency are reassigned to migrate the latency.

Edge computing system
11582283 · 2023-02-14 · ·

A method of traffic reduction in a mesh computing system (400), the mesh computing system (400) comprising hosts located on edge nodes of the mesh computing system (400) and a central registry located outside the mesh computing system (400), the central registry holding the images. The method comprises, at a first host located at a first edge node, receiving (920) a request from a client for an image, sending (930) a request for the image to at least one other host of the mesh computing system (400). When the first host receives (940) notification that at least a second host holds the image, the first host downloads (960) the image from the second host to the first host. The first host creates (970) a container from the image. A host at a node (636; 700) and a mesh computing system (400) are also provided.

Ranking notifications based on rules

System and methods for enhancing user productivity by integrating multiple services and providing a centralized output to a user is disclosed. A message notification server may receive store a set of notification rules and, as various notifications are received, the server may dynamically monitor them for processing to users. The system may automatically re-rank the notifications based on changed conditions or to present messages of greatest urgency or importance. The system may also store sender-specific sets of rules, governing how notifications are to be handled for different application servers or services.

Technologies for scalable capability detection for multimedia casting
11582270 · 2023-02-14 ·

Technologies for casting digital media content include a source computing device communicatively coupled to a destination computing device. The source computing device is configured to transmit a set of identifiers of the source computing device to the destination computing device and receive a set of identifiers of the destination computing device from the destination computing device. Each set of identifiers includes a version (e.g., hardware or software) associated with the respective computing device and a unique identifier of the respective computing device. The source computing device is additionally configured to determine a subset of casting session parameters from a set of casting session parameters based on the one or more capabilities of the destination computing device which are usable by the destination computing device to establish a casting session and stream digital media content in accordance with the subset of casting session parameters. Other embodiments are described and claimed.

Computer aided systems and methods for creating custom products
11580581 · 2023-02-14 · ·

A computer-aided design system enables physical articles to be customized via printing or embroidering and enables digital content to be customized and electronically shared. A user interface may be generated that includes an image of a model of an article of manufacture and user customizable design areas that are graphically indicated on the image corresponding to the model. A design area selection may be received. In response to an add design element instruction and design element specification, the specified design element is rendered in the selected design area on the model image. Customization permissions associated with the selected design area are accessed, and using the customization permissions, a first set of design element edit tools are selected and rendered. User edits to the design element may be received and rendered in real time. Manufacturing instructions may be transmitted to a printing system.

Computer aided systems and methods for creating custom products
11580581 · 2023-02-14 · ·

A computer-aided design system enables physical articles to be customized via printing or embroidering and enables digital content to be customized and electronically shared. A user interface may be generated that includes an image of a model of an article of manufacture and user customizable design areas that are graphically indicated on the image corresponding to the model. A design area selection may be received. In response to an add design element instruction and design element specification, the specified design element is rendered in the selected design area on the model image. Customization permissions associated with the selected design area are accessed, and using the customization permissions, a first set of design element edit tools are selected and rendered. User edits to the design element may be received and rendered in real time. Manufacturing instructions may be transmitted to a printing system.

Computer aided systems and methods for creating custom products
11580581 · 2023-02-14 · ·

A computer-aided design system enables physical articles to be customized via printing or embroidering and enables digital content to be customized and electronically shared. A user interface may be generated that includes an image of a model of an article of manufacture and user customizable design areas that are graphically indicated on the image corresponding to the model. A design area selection may be received. In response to an add design element instruction and design element specification, the specified design element is rendered in the selected design area on the model image. Customization permissions associated with the selected design area are accessed, and using the customization permissions, a first set of design element edit tools are selected and rendered. User edits to the design element may be received and rendered in real time. Manufacturing instructions may be transmitted to a printing system.

System, computer program product and method for risk evaluation of API login and use

A method, system and computer program product assess risk of an unauthorized API login and mitigate damage from an unauthorized API login. The method includes collecting in a database license attributes of a user license, user profile attributes, and database content change attributes; receiving an API login request; comparing features of the API login request to at least one of the database license attributes, user profile attributes, and database content change attributes against a predetermined threshold; assessing a risk of the an unauthorized API login request based on a result of the comparison; and based on a level of the assessed risk, implemented protective action to mitigate harm that may result from an unauthorized user from accessing information or services from a computer system by way of an API.

Systems and methods for constrained path computation in networks with connectivity and resource availability rules
11582135 · 2023-02-14 · ·

Systems and methods for constrained path computation in networks with connectivity and resource availability rules build the necessary constraints directly into the routing graph so that all paths found are by construction satisfying of all the constraints. This is in contrast to the conventional approach of finding multiple paths and then applying the constraints. The present disclosure efficiently addresses the necessary constraints in the routing graph. Path Computation Engine (PCE) performance in terms of time to return acceptable paths to the user generically degrades as network scale (typically expressed through length and number of paths) increases. The present disclosure keeps the input graph small even though the graphs have expanded functionality to address constraints.