Patent classifications
G06F16/1805
Decentralized out-of-band accelerated blockchain transaction processing
An example operation may include one or more of identifying a blockchain transaction requiring commitment processing for commitment to a blockchain, determining the blockchain transaction is delayed, responsive to identifying the blockchain transaction is delayed, creating a transaction acceleration smart contract defining an incentive for performing the commitment processing of the blockchain transaction, and storing the transaction acceleration smart contract blockchain in a different blockchain.
Creating blocks in instance blockchain base on a promised block in a generic blockchain
A system, method, and computer-readable storage medium is provided for creating first and second blockchain instances, each comprising representative blocks corresponding to steps in first and second multistep processes, respectively; performing a linking operation to link a block in the first blockchain instance to a block in the second blockchain instance; receiving change evidence data pertaining to steps in one of the first and second multi-step processes; and performing an update operation comprising updating one of the first and second blockchain instances based on said change evidence data.
Processing out of order writes in a log structured file system for improved garbage collection
Improving performance of garbage collection (GC) processes in a deduplicated file system having a layered processing architecture that maintains a log structured file system storing data and metadata in an append-only log arranged as a monotonically increasing log data structure of a plurality of data blocks wherein a head of the log increases in chronological order and no allocated data block is overwritten. The storage layer reserves a set of data block IDs within the log specifically for the garbage collection process, and assigns data blocks from the reserved set to GC I/O processes requiring acknowledgment in a possible out-of-order manner relative to an order of data blocks in the log. It strictly imposes using in-order I/O acknowledgement for other non-GC processes using the storage layer, where these processes may be deduplication backup processes using a segment store layer at the same protocol level as the GC layer.
Journal Parsing for Object Event Generation
A system can register a first client and a second client to respectively receive information about updates to a write-ahead log structured storage engine that comprises a log. The system can read an entry in the log, the entry being of an update type. The system can, in response to determining that the first client is registered to receive at least some of the information about updates that are of the update type, sending, to the first client, entry information about the entry. The system can, in response to determining that the second client is registered to receive information about updates that are of the update type, sending, to the second client, the entry information about the entry.
Systems and methods for privacy preserving distributed ledger consensus
A method includes receiving a consensus agreement rule (“CAR”) comprising identities of a first party and second party; receiving a first SignedData message comprising first content and a first digital signature; creating a second SignedData message comprising a second digital signature of the second party on a hash of the second content and an acceptance indication; verifying, based on the acceptance indication and based on the identities on the CAR matching the identities on the signatures, that the second party accepted the terms of the agreement; and transmitting the second SignedData message to a trusted party for posting to a distributed ledger, wherein the terms of the agreement are kept private while the second SignedData message is posted to the distributed ledger, and wherein the terms of the agreement are formatted as a smart contract whose execution causes a transfer of value in response to a fulfillment of a condition.
CRYPTOGRAPHIC SYSTEMS AND METHODS USING DISTRIBUTED LEDGERS
The disclosure relates to, among other things, systems and methods for facilitating the secure recording of assertions made by entities tied to identities. Embodiments of the disclosed systems and methods may allow users to make non-revocable, difficult to forge, cryptographic assertions tied to their identities through the posting of entries in an immutable ledger. In certain embodiments, a user's cryptographic assertions may be preceded by ledger entries which feature certificates from trusted authorities that tie the keys used for making assertions to the user's identity. Further embodiments provide for a mechanism for disabling further entries posted under a user's key, either automatically or at the user's initiation.
SYSTEM AND METHOD FOR SECURING INFORMATION IN A DISTRIBUTED NETWORK VIA A DISTRIBUTED IDENTIFIER
Embodiments of the invention are directed to a system, method, or computer program product for an approach to securing information stored in a distributed network. The system allows for generating distributed identifiers for information entries, wherein the distributed identifiers mask the information entries using a hash function and the distributed identifiers are dispersed across distributed ledgers. The system also allows for originating nodes to access the information entries within the distributed identifiers, while permitting other nodes and domains to reference the distributed identifiers themselves instead of referencing the information entries.
Classification in hierarchical prediction domains
There is a need for solutions that classification solutions in hierarchical prediction domains. This need can be addressed by, for example, performing one or more online machine learning, co-occurrence analysis machine learning, structured fusion machine learning, and unstructured fusion machine learning. In one example, structured predictions inputs are processed in accordance with an online machine learning analysis to generate structurally hierarchical predictions and in accordance with a co-occurrence analysis machine learning analysis to generate structurally non-hierarchical predictions. Then, the structurally hierarchical predictions and the structurally non-hierarchical predictions in accordance with processed by a structured fusion model to generate structure-based predictions. Afterward, the structure-based predictions and non-structure-based predictions are processed in accordance with an unstructured fusion model to generate one or more unstructured-fused predictions.
ABNORMAL LOG EVENT DETECTION AND PREDICTION
The embodiments of the present disclosure disclose a computer-implemented method, computer system and a computer program product for detecting and predicting an abnormal log event. In the method, a current event cluster from a plurality of event clusters for a log line in a log file is determined. The plurality of event clusters include at least one abnormal event cluster. Then, a time of event transition from the current event cluster to at least one abnormal event cluster is predicted.
Method for reading and writing data and distributed storage system
The present application discloses a data read and write method and a distributed storage system. A specific implementation of the method includes: receiving, from a client, by a shard server, a processing request on shard data, the processing request comprising a data identifier of the shard data; processing the processing request based on a hash table pre-loaded in a memory and indicating a correspondence between the data identifier of the shard data and a data index to obtain a processing result; and sending the processing result to the client.