Patent classifications
G06F16/2379
Electrical meter for training a mathematical model for a device using a smart plug
An electrical panel or an electrical meter may provide improved functionality by interacting with a smart plug. A smart plug may provide a smart-plug power monitoring signal that includes information about power consumption of devices connected to the smart plug. The smart-plug power monitoring signal may be used in conjunction with power monitoring signals from the electrical mains of the building for providing information about the operation of devices in the building. For example, the power monitoring signals may be used to (i) determine the main of the house that provides power to the smart plug, (ii) identify devices receiving power from the smart plug, (iii) improve the accuracy of identifying device state changes, and (iv) train mathematical models for identifying devices and device state changes.
Device telemetry control
Various example embodiments for supporting device telemetry control are presented. Various example embodiments may provide a customer of a device, which is monitoring the device based on device telemetry whereby the device exposes device data of the device based on device telemetry control information of the device such that the data of the device may be accessed by the customer, with control over device telemetry of the device. Various example embodiments may provide a customer, which may access device data of a device based on device telemetry supported by the device, with additional control over access to the device data of the device via device telemetry by providing the customer with control over the device telemetry including enabling the customer to insert customer device telemetry control information into the device telemetry control information of the device that controls device telemetry on the device.
Allocating cache memory in a dispersed storage network
A method for execution by a dispersed storage network (DSN) managing unit includes receiving access information from a plurality of distributed storage and task (DST) processing units via a network. Cache memory utilization data is generated based on the access information. Configuration instructions are generated for transmission via the network to the plurality of DST processing units based on the cache memory utilization data.
Blockchain-based trustable guarantees
Disclosed herein are methods, systems, and apparatus for processing blockchain-based guarantee information. One of the methods includes receiving a first cyphertext of a first digital document specifying a guarantee from a first computing device associated with at least a first guarantor and one or more zero-knowledge proofs (ZKPs) related to one or more values associated with the guarantee, and the first digital document specifies one or more predetermined conditions of executing the guarantee; verifying that the one or more ZKPs are correct; storing the first cyphertext to a blockchain based on performing a consensus algorithm; receiving a first message from a second computing device associated with a beneficiary or a representative of the beneficiary.
Multi-client transaction validation
An example operation may include one or more of identifying a plurality of instances of a blockchain storage request that have been independently submitted by a plurality of clients, respectively, verifying whether execution content of the plurality of instances of the blockchain storage request match, and in response to verifying the match, storing the blockchain storage request within a block among a hash-linked chain of blocks.
Blockchain-based systems and methods for communicating, storing and processing data over a blockchain network
A computer-implemented method for transmitting and/or submitting digital content such as feedback for an entity to a blockchain is disclosed. This may be, for example, the Bitcoin blockchain. The method, which is implemented at a first node, includes: submitting, to the blockchain, a first transaction for committing a first quantity of tokens to transfer to a second node associated with the entity, the first transaction having a first output; generating a first content for submission to the blockchain; and submitting, to the blockchain, a second transaction that returns a second quantity of the committed first quantity of tokens to an address associated with the first node, the second transaction having the first output of the first transaction as an input, wherein the first content is used to unlock the first output of the first transaction.
Protecting sensitive data
An example operation may include one or more of capturing a current version of sensitive data by a data processor node, hashing, by the data processor node, the current version of the sensitive data, storing, by the data processor node, a hash of the current version of the sensitive data on a first blockchain, encrypting, by the data processor node, the current version of the sensitive data using a secret key, and storing the encrypted current version of the sensitive data on a second blockchain.
Device, system and method for mode-based synchronization of data records
A device, system and method for mode-based synchronization of data records is provided. Booking data is received, at one or more computing devices, from one of a first and second client device. When received from the first client device, in a first order mode for the booking data, the device(s): cause an order management system (OMS) to generate: order data at a first database; and cause a legacy system to generate a corresponding passenger name record (PNR) at a second database, the corresponding PNR being slaved to the order data. When received from the second client device, in a legacy mode for the booking data, the device(s): cause the legacy system to generate, a PNR and/or ticket data at the second database; and cause the OMS to generate corresponding order data at the first database, the corresponding order data being slaved to the PNR and/or the ticket data.
Systems and methods for quantum file permissions
Providing quantum file permissions is disclosed herein. In one example, a quantum computing device includes a permissions database that stores permissions information for a plurality of quantum files. A quantum file permissions service, executing on a processor device of the quantum computing device, receives from a requestor a permissions query for a permissions status (i.e., a read permission indicator, a write permission indicator, and/or an execute permission indicator, as non-limiting examples) of a quantum file including a plurality of qubits. In response, the quantum file permissions service accesses permissions information for the quantum file from the permissions database. The quantum file permissions service uses the permissions information from the permissions database to determine a permissions status of the quantum file. The quantum file permissions service then sends a response to the requestor indicating the permissions status of the quantum file.
Transaction-enabled systems and methods for royalty apportionment and stacking
Transaction-enabled systems and methods for royalty apportionment and stacking are disclosed. An example system may include a plurality of royalty generating elements (a royalty stack) each related to a corresponding one or more of a plurality of intellectual property (IP) assets (an aggregate stack of IP). The system may further include a royalty apportionment wrapper to interpret IP licensing terms and apportion royalties to a plurality of owning entities corresponding to the aggregate stack of IP in response to the IP licensing terms and a smart contract wrapper. The smart contract wrapper is configured to access a distributed ledger, interpret an IP description value and IP addition request, to add an IP asset to the aggregate stack of IP, and to adjust the royalty stack.