G06F16/1834

DEPLOYING A SECOND SMART CONTRACT BASED ON A FIRST SMART CONTRACT

A network node that includes at least one processor, at least one memory, and at least one network interface. The network node is configured to be within a plurality of network nodes communicatively coupled in a peer-to-peer network of network nodes implementing a distributed ledger. The network node is communicatively coupled to at least one remotely located computing device through the at least one network interface. The at least one processor is configured to deploy a second smart contract at a second address on the distributed ledger; set an address field in the first smart contract to reference the second address; subtract a particular number of tokens from a first respective value corresponding to a first respective address in the first table of balances; and add the particular number of tokens to a second respective value corresponding to the second address in the first table of balances.

Cooperative download among low-end devices under resource constrained environment
20170346887 · 2017-11-30 ·

The disclosure provides systems and methods for efficient arrangement, use, and management of networked electronic devices. The networked electronic devices are configured to form a peer-to-peer network, and to allocate management, download, and aggregation responsibilities among themselves to improve efficiency. Networking errors are minimized by replacing faulting nodes with idle nodes.

System and method for document transformation and accountability

A system and method for document transformation and recordation is provided. Documents for a transaction of real property are identified based on a jurisdiction in which the real property is located. Each document includes a plurality of data fields and each data field is associated with a data field identifier. A data value is received in at least one of the data fields of one or more of the documents. The data fields in the documents associated with the data field identifiers that match the data field identifiers of the data fields in which the data values are received are identified. The identified data fields are automatically populated with the data values based on the data field identifiers associated with the data values. A completeness rule is applied to the documents by verifying whether all required documents for completing the transaction in the jurisdiction are satisfied by the documents.

METHOD AND SYSTEM FOR VERIFYING OWNERSHIP OF A DIGITAL ASSET USING A DISTRIBUTED HASH TABLE AND A PEER-TO-PEER DISTRIBUTED LEDGER
20220366020 · 2022-11-17 ·

A computer-implemented method (600) and system (1) for verifying ownership of a computer software after installation and prior to execution using a distributed hash table (13) and a peer-to-peer distributed ledger (14). This may be the Bitcoin blockchain or an alternative implementation. The method includes determining (610) a second user public key associated with a second user (24) from a transaction record stored on the peer-to-peer distributed ledger (14). A second public key associated with the second user may be determined (620) from an entry on the distributed hash table (13). The method further includes comparing (630) the second user public key and the second public key, and verifying (640) the ownership of the computer software based on the comparing of the second user public key and the second public key.

Multi-subject device access authorization

An example operation may include one or more one or more of receiving two or more authorization decisions from two or more authorization entities into a blockchain system, recording the two or more authorization decisions into one or more blocks of a blockchain of the blockchain system, determining, by the blockchain system, whether the two or more authorization decisions satisfy a policy to authorize access to at least one of a device or identifiable content on the device, and when the two or more authorization decisions satisfy the policy, authorizing access to a public key that can be used to gain access to the device.

System and method for document transformation and compliance

A system and method for document transformation and compliance are provided. Document templates are maintained and each template includes data fields each associated with a data field identifier. Data values are received in one or more of the data fields of at least one document template. The data values are associated with the data fields into which the data values are received via the data field identifiers for those data fields. A property address is received and a set of compliance rules is identified. A subset of the document templates are retrieved as active documents for a transaction of the property based on the identified rules. The active documents are populated with those data fields that are associated with the linked data values via the data field identifiers. Compliance checking of the populated data values in the active documents is performed using a compliance rule set.

Blockchain-based system and method for listing document transformation and accountability

A method for listing document transformation and recordation is provided. Documents relating to a real estate listing are identified and each document includes data fields associated with data field identifiers. A data value is received from a user in at least one of the data fields. A data model includes the data values received from the user and the data field identifiers of the data fields for which the data values are received is generated. The data fields associated with data field identifiers that match the data field identifiers of the data fields in which the data values are received are identified and populated with the data values. One or more correctness rules to be applied to the populated data fields of the documents are identified and applied to the documents by verifying that the data values populating the data fields are verified by one or more authoritative sources.

METHODS AND APPARATUS FOR A DISTRIBUTED DATABASE WITHIN A NETWORK
20170308548 · 2017-10-26 · ·

In some embodiments, an apparatus includes an instance of a distributed database at a first compute device configured to be included within a set of compute devices that implement the distributed database. The apparatus also includes a processor configured to define a first event linked to a first set of events. The processor is configured to receive, from a second compute device from the set of compute devices, a signal representing a second event (1) defined by the second compute device and (2) linked to a second set of events. The processor is configured to identify an order associated with a third set of events based at least one a result of a protocol. The processor is configured to store in the instance of the distributed database the order associated with the third set of events.

Community internet drive
09800464 · 2017-10-24 · ·

Provided herein are devices, systems, methods and various means, including those related to providing a community internet drive that may utilize a centrally-managed hub as well as storage devices distributed among various networked machines. In some embodiments, the community internet drive can also include features to enable its users to promote and utilize the user's trusted personal relationships while also enabling an open platform for peer-to-peer and/or other types of sharing schemes.

RESPONDING TO DANGEROUS TRANSPORT-RELATED SOUNDS

An example operation includes one or more of detecting, by a transport, an increase in sound pressure of at least one portion of an audio stream, determining, by the transport, whether the increase in the sound pressure of the at least one portion is atypical audio, determining, by the transport, a probable root cause of the atypical audio, and initiating, by the transport, a response when the probable root cause is determined to be urgent.