G06F16/1834

Automatic formation of a virtual chassis using zero touch provisioning

A network device may obtain information concerning a virtual chassis that indicates that the network device and an additional network device are to be included in the virtual chassis. The network device may determine, based on the information concerning the virtual chassis, that the network device is connected to the additional network device, wherein the network device is connected to the additional network device via a link between a network interface of the network device and a network interface of the additional network device. The network device may cause the network interface of the network device to be converted to a virtual chassis interface and the network interface of the additional network device to be converted to a virtual chassis interface to enable the network device and the additional network device to be included in the virtual chassis to allow bootstrapping of the virtual chassis as a single logical device.

NETWORK CONFIGURATION MANAGEMENT FOR NETWORKED CLIENT DEVICES USING A DISTRIBUTED LEDGER SERVICE

A system and method for managing a plurality of network-enabled client devices such as networking equipment and Internet of Things (IoT) devices which employs a distributed ledger, or blockchain, to store network configuration information for each client device. Access to the distributed ledger may be provided through a proxy computing system that is configured to exchange control messages with the client devices. Network configuration information is defined in smart contracts stored in the distributed ledger which are executed on registration of the network-enabled client device in the distributed ledger.

LINKING BLOCKCHAIN OPERATIONS

A node in a blockchain network may create a mapping scheme operation header for a subsequent operation, identify a first preceding operation in a first preceding block, the first preceding operation linked to the subsequent operation, and include a location of the first preceding block in the mapping scheme operation header for the operation proposal.

Managing cryptographically secure exchanges of data using permissioned distributed ledgers

The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that manage cryptographically secure exchanges of data using a permissioned distributed ledger. For example, an apparatus may obtain parameter data and additional content associated with a data exchange. The apparatus may generate first data that includes at least a portion of the additional content accessible to a first computing system, and may generate second data that includes at least a portion of the parameter data. The apparatus may provide the first data to a peer computing system, which records encrypted information associated with the first data within an element of a distributed ledger accessible at the first computing system. The apparatus may also provide the second data to a second computing system, which executes the data exchange in accordance with at least the portion of the parameter data.

Peer-to-peer network for blockchain security
11526610 · 2022-12-13 · ·

A method and apparatus utilize a peer-to-peer network of security nodes collectively adhering to a protocol for inter-node communication. The system is comprised a plurality of first security nodes, at least one second security node, and at least one third security node. The plurality of first security nodes receive at least one of pre-trained detection models and rules, monitor at least one of a blockchain and connected devices for malicious behavior based on the received at least one of pre-trained detection models and rules, and report the malicious behavior. The at least one second security node creates and communicates the at least one of pre-trained detection models and rules to the plurality of first security nodes. The at least one third security node is informed by the at least one second security node of the reported malicious behavior.

Approximate hash verification of unused blockchain output

An example operation may include one or more of receiving a location of an output stored on a data structure of a blockchain, where the location comprises a path of hashes generated by a reduced-step hash instead of a full-step hash of the blockchain, performing an approximate hash verification on the path of hashes based on the reduced-step hash values to verify whether the output is unused, and in response to a determination that the output is unused as a result of the approximate hash verification, approving a use of the output by a client associated with the output.

Database snapshot for managing state synchronization

An example operation may include one or more of generating a snapshot of a state of a permissioned blockchain, generating a unique identifier of the state snapshot that distinguishes the state snapshot from other state snapshots of the permissioned blockchain, storing the state snapshot in a data store, and storing proof of the state snapshot including the unique identifier and a storage location of the state snapshot on a public blockchain.

Probabilistic verification of linked data

An example operation may include one or more of storing a data block that is included within a sequential chain of data blocks and which comprises a probabilistic data structure stored therein, receiving a request to verify another data block, determining whether a probabilistic hash of the other data block is included within the probabilistic data structure of the stored data block, and in response to a determination that the hash of the other data block is included within the probabilistic data structure, storing an indicator that the other data block is included within the sequential chain of data blocks.

Blockchain distribution network

A server in a blockchain distribution network includes a processor and a transceiver operatively coupled to the processor. The transceiver is configured to receive bytes of a transaction from a first peer node. The transceiver is also configured to propagate the bytes of the transaction to one or more additional peer nodes and to one or more additional servers in the blockchain distribution network. The transceiver is also configured to receive bytes of a blockchain from a second peer node. The blockchain includes information regarding a plurality of transactions, and the plurality of transactions includes the transaction. The transceiver is further configured to propagate the bytes of the blockchain to the one or more additional peer nodes and to the one or more additional servers in the blockchain distribution network.

Blockchain timestamp agreement

An example operation may include one or more of receiving a blockchain request from a client application, determining a network latency between the client application and the endorsing node based on a network path between the client application and the endorsing node, extracting a timestamp from the blockchain request, determining whether the extracted timestamp is invalid based on the network latency between the client application and the endorsing node, and in response to determining that the timestamp is valid, generating an endorsement for the blockchain request and transmitting the endorsement to the client application.