G06F21/64

MAINTAINING CRYPTO TOKENS WITH IMPROVED BONDING CURVE
20230048300 · 2023-02-16 ·

A computer-implemented method for maintaining crypto tokens of a first type. A smart contract from a distributed ledger defines a bonding curve being as a sequence of multiple curve segments. A creation or annul function of the smart contract may integrate a bonding curve starting from the current supply size to a new supply size to determine an amount of crypto tokens of a second type. The crypto tokens of the second type may be transferred to or from a pool associated with the smart contract, while crypto tokens of the first type may be transferred to a user or may be destroyed. The current supply size of first type tokens may be updated correspondingly.

CORRUPTION DETERMINATION OF DATA ITEMS USED BY A BUILD SERVER
20230049131 · 2023-02-16 ·

In some examples, a system receives first measurements of data items used by a build server in building an executable program, the data items copied from a data repository to a storage partition that is separate from the data repository, and the storage partition to store the data items relating to building the executable program by the build server. The system determines, based on the first measurements and according to a policy specified for the storage partition, whether a corruption of the data items used by the build server in building the executable program has occurred.

CORRUPTION DETERMINATION OF DATA ITEMS USED BY A BUILD SERVER
20230049131 · 2023-02-16 ·

In some examples, a system receives first measurements of data items used by a build server in building an executable program, the data items copied from a data repository to a storage partition that is separate from the data repository, and the storage partition to store the data items relating to building the executable program by the build server. The system determines, based on the first measurements and according to a policy specified for the storage partition, whether a corruption of the data items used by the build server in building the executable program has occurred.

CORRELATION OF A VIRTUAL MACHINE TO A HOST WITHIN A VIRTUAL DOMAIN

Aspects of the subject disclosure may include, for example, identifying a request to install a guest virtual machine on a physical host; identifying a UUID of the physical host; generating a virtual machine reference value; defining a modified UUID of the guest virtual machine comprising the UUID of the physical host and the virtual machine reference value; and assigning the modified UUID to the guest virtual machine, the physical host being identifiable via the modified UUID of the guest virtual machine. Other embodiments are disclosed.

CORRELATION OF A VIRTUAL MACHINE TO A HOST WITHIN A VIRTUAL DOMAIN

Aspects of the subject disclosure may include, for example, identifying a request to install a guest virtual machine on a physical host; identifying a UUID of the physical host; generating a virtual machine reference value; defining a modified UUID of the guest virtual machine comprising the UUID of the physical host and the virtual machine reference value; and assigning the modified UUID to the guest virtual machine, the physical host being identifiable via the modified UUID of the guest virtual machine. Other embodiments are disclosed.

SYSTEM AND PLATFORM FOR DEIDENTIFIED AND DECENTRALIZED SOCIAL GAMING VIA THE BLOCKCHAIN

A system, method, device, and platform for performing a gaming utilizing blockchain. A player profile is created in response to information received from a player. Gaming information is received from the player associated with the one or more games. Selections are assigned to the player for the one or more games utilizing player profile and the gaming information. Winners and a host with each of the one or more games of the one or more games are compensated once the one or more games are completed. The player profile, the gaming information, the selections, and the winners are documented utilizing the blockchain.

Permissions from entities to access information

In some examples, in response to a request from a client device for information relating to a transaction stored by a blockchain, a system identifies, using information stored in a distributed storage system that stores data for the blockchain, multiple data owner entities from which permissions are to be obtained for access of the information, and determines an authorization requirement for the information based on a smart contract. The system sends authorization information based on the authorization requirement to trigger a retrieval of authorization tokens from the identified data owner entities for access of the information, and sends the information to the client device in response to receiving the authorization tokens.

Permissions from entities to access information

In some examples, in response to a request from a client device for information relating to a transaction stored by a blockchain, a system identifies, using information stored in a distributed storage system that stores data for the blockchain, multiple data owner entities from which permissions are to be obtained for access of the information, and determines an authorization requirement for the information based on a smart contract. The system sends authorization information based on the authorization requirement to trigger a retrieval of authorization tokens from the identified data owner entities for access of the information, and sends the information to the client device in response to receiving the authorization tokens.

Implicit integrity for cryptographic computing

In one embodiment, a processor includes a memory hierarchy and a core coupled to the memory hierarchy. The memory hierarchy stores encrypted data, and the core includes circuitry to access the encrypted data stored in the memory hierarchy, decrypt the encrypted data to yield decrypted data, perform an entropy test on the decrypted data, and update a processor state based on a result of the entropy test. The entropy test may include determining a number of data entities in the decrypted data whose values are equal to one another, determining a number of adjacent data entities in the decrypted data whose values are equal to one another, determining a number of data entities in the decrypted data whose values are equal to at least one special value from a set of special values, or determining a sum of n highest data entity value frequencies.

Electronic element, system comprising such an electronic element and method for monitoring and cutting off a processor on occurrence of a failure event
11579995 · 2023-02-14 · ·

An electronic element includes: a module for storing reference data; a module for receiving data from a processor; a module for verifying the received data by comparison by way of reference data; and a module for transmitting an instruction to cut off supply of the processor, the supply cutoff instruction being transmitted after occurrence of a failure event, the failure event being an absence of reception of data or a failure in verifying the data. A system including such an electronic element and a method for monitoring a processor by the electronic element are also described.