Patent classifications
G06F16/2372
NOVEL MEANS AND METHODS FOR IMPLEMENTATION OF SECURE TRANSACTIONS
A capital management system enabling sanctioned secure flow of capital from blockchain environment to creditor entities comprising a. a client's capital blockchain secured smart contract including a client sanctioned withdrawal of capital module configured to release capital upon request of said client b. an electronic creditor entity activated client smart wallet, said smart wallet including an interrogation module said client's capital blockchain secured smart contract (contract A), interconnected with said client smart wallet interrogation module and said electronic creditor entity wherein said smart wallet interrogation module is configured to interrogate said client's capital blockchain secured smart contract and verify status of said smart contract A of predetermined terms and requirements of said credit entity and upon verification activate said sanctioned withdrawal of capital and transfer payment from said client's capital blockchain secured smart contract to said smart wallet, said smart wallet configured to automatically transfer funds to said creditor entity.
System performance logging of complex remote query processor query operations
Described are methods, systems and computer readable media for performance logging of complex query operations.
Method, system, and computer program product for simulating an online session
A method and system for conducting an offline session simulating an online session between a client and server in a network environment. The client imports data and functional logic from the server prior to going offline. The imported functional logic is embedded into a format or document that is capable of being interpreted and performed by the local interface at the client that is used to interact with server during an online session. Whether offline or online, the user utilizes the same local interface at the client to transmit instructions to the functional logic in order to manipulate the data. In an offline session, such instructions cause the imported and embedded functional logic to execute, thereby manipulating the data that is imported at the client. Known synchronization methods may also be used in order to maintain consistency and coherency between the imported data at the client and the database at the server.
Method, Apparatus and Data Structure for Copying Values of a Table of a Database
A method for copying values of a table of a database between a primary memory and a secondary memory comprises selecting one or more segments, wherein the table is organized in a plurality of stripes and a plurality of vertical partitions, wherein a stripe comprises at least two rows of the table, wherein a vertical partition comprises one or more columns of the table, wherein each of the plurality of segments comprises values at a cross-section of a stripe and a vertical partition, and wherein each of the plurality of segments stores adjacent column values in adjacent locations of the primary or the secondary memory, and copying the one or more selected segments between the primary memory and the secondary memory.
Surrogate cache for optimized service access with compact user objects and offline database updates
When a request for accessing a service is received, a user object may be stored in a long-term data store, as well as in a short-term cache. The cache may be divided into a regular cache that stores full versions of the user objects, and a surrogate cache that stores compact versions of the user object. The compact version of the user object may include a field that is derived from the full user object indicating whether a subsequent request for access to a particular service should be granted. After access is granted/denied based on this value in the compact user object, the system can process an update to the full user object offline. This surrogate cache structure may be used to rapidly approve/deny requests, decoupling this procedure from the processing involved with a full user object.
RECURSIVE DATA TRAVERSAL MODEL
One or more embodiments interpret a configuration graph to efficiently and optimally construct requests and fetch data from a datastore. The values of objects of a requested data type are used to generate additional queries for pre-fetching data from the datastore. Specifically, the values are used to query for and retrieve a corresponding subset of objects of another, related data type. Recursively querying for and retrieving objects of related data types based on already retrieved objects builds a data cache of relevant objects. The cached, relevant objects may be useful in subsequent queries that are likely to follow the initial query.
DETECTION SYSTEM AND METHOD, AND RELATED APPARATUS
Provided are a detection system and method, and related apparatuses. The detection system includes a cloud detection platform and a detection terminal, wherein a cloud public database and a first user self-built library corresponding to a user are deployed on the cloud detection platform. The detection terminal is configured to, after it is determined that the user successfully logs in and the logging is not for the first time, send a database access request carrying features of a to-be-detected substance to the cloud detection platform, and receive a detection result returned by the cloud detection platform. The cloud detection platform is configured to receive the database access request sent by the detection terminal, detect the features of the to-be-detected substance based on the cloud public database and the first user self-built library to obtain the detection result, and return the detection result to the detection terminal.
Data synchronization error resolution based on UI manipulation actions
A synchronization protocol is provided that can be used to resolve synchronization errors encountered while trying to synchronize versions of data objects between a client device and a remote computing system. The protocol includes a client device, in an offline processing mode, handling user interface (“UI”) manipulation actions on one or more UI elements of one or more UI screens. The handling of the UI manipulation actions modifies or creates a local version of a data object stored on the client device. The UI manipulation actions are stored by the client device and sent to the remote computing system. The client device receives a synchronization error notification from the remote computing system. After receiving the notification, the client device displays, in one of the UI screens, the local version of the data object and one or more indications of a synchronization error.
COMPUTER DATA DISTRIBUTION ARCHITECTURE CONNECTING AN UPDATE PROPAGATION GRAPH THROUGH MULTIPLE REMOTE QUERY PROCESSING
Described are methods, systems and computer readable media for computer data distribution architecture connecting an update propagation graph through multiple remote query processors.
Self-healing real-time data processing
Methods and systems for processing incoming data in real-time are described herein. The incoming data is processed in real-time to generate data records that may be improved over time, for example, by automatically correcting inaccurate data in the records. In some embodiments, when data is received, a real-time process is initially performed on the received data under a first time constraint to produce first data for a data record. Subsequently, one or more non-real-time processes are then performed on the received data under a second time constraint to produce second data for the data record. The second data may be used to update the data record, for example, to correct any inaccuracy caused by the real-time process of the received data. Preferably, the second time constraint is longer than the first time constraint.