G06F16/2272

Fast Skip-List Scan and Insert
20230237035 · 2023-07-27 ·

Techniques are disclosed relating to efficiently managing skip list data structures. In various embodiments, a computing system stores a skip list including a plurality of key-value records that include one or more pointers to others of the plurality of key-value records. The computing system scans the skip list for a location associated with a particular key. The scanning includes using a prefix of the particular key to identify a particular portion of the skip list, where the particular portion includes key-value records having keys with the same prefix. The scanning also further includes initiating a scan for the location within the identified portion. In some embodiments, the computing system inserts a key-value record into the skip list at the location associated with the particular key in response to the scan identifying the location.

EFFICIENT IN-MEMORY MULTI-VERSION CONCURRENCY CONTROL FOR A TRIE DATA STRUCTURE BASED DATABASE
20230022756 · 2023-01-26 ·

The invention describes a method for determining a storage location of a database object of a specific version, wherein indexes for each version of the database object are stored in a trie having a root node corresponding to the specific version, the method comprising: determining a trie corresponding to the specific version by accessing the root node of the trie corresponding to the specific version; determining an object identifier of the database object by traversing the trie corresponding to the specific version using a secondary key related to the database object as search key; determining the storage location of the database object by traversing the trie corresponding to the specific version using the determined object identifier as search key.

CONFIDENTIAL ASSET TRANSACTION SYSTEM
20230028112 · 2023-01-26 ·

A system is provided for controlling privacy in an exchange of an asset. The system receives an offer query of an offeror that includes an offeror reveal condition, an asset identifier of the asset, and offeror terms of exchange. The system accesses an offeree reveal condition and offeree terms of exchange for the asset. The system determines whether the offeror reveal condition and the offeree reveal condition are satisfied and determines whether the offeror terms of exchange and the offeree terms of exchange are satisfied. When the offeror reveal condition, the offeree reveal condition, the offeror terms of exchange, and the offeree terms of exchange are satisfied, the system reveals the offeror to the offeree and the offeree to the offeror.

Techniques for accurately specifying identification information
11561970 · 2023-01-24 · ·

An information processing apparatus capable of accurately specifying identification information whose users are the same user regardless of information registered by users is provided. The information processing apparatus may include at least one memory storing instructions and at least one processor configured to execute the instructions to: acquire positional information associated with at least one piece of related identification information related to each of a plurality of pieces of identification information for identifying users in a communication service; specify hierarchized positional information indicating positional information hierarchized in accordance with a granularity level of a position based on the positional information; calculate a similarity between pieces of identification information using the hierarchized positional information; and specify the pieces of identification information belonging to the same user from among the plurality of pieces of identification information based on the calculated similarity.

MERGING A MATRIX USER STRUCTURE INTO A MULTILINE USER STRUCTION
20230229648 · 2023-07-20 ·

Disclosed herein is a system and method to any existing Matrix MLM to be merged into a Multiline MLM system. Further the existing MLM members have full access to the Multiline MLM commission structure, for example, a member of a Matrix MLM will maintain their existing lines and downlines.

DATA STRUCTURE STORAGE OPTIMISATION
20230229649 · 2023-07-20 ·

A method of maintaining a data structure comprising: creating a data block; transmitting a message to validator devices requesting permission to add said data block to the data structure; determining that consensus is reached, and in response: forming a first sub-chain in the data-structure by adding the data block to the data structure, the first sub-chain starting with a genesis block and ending with said data block, wherein the data block comprises a block number indicating the number of blocks in the data structure from the genesis block, and creating a further data block; transmitting a further message to the validator devices requesting permission to add said further data block to the data structure; determining that consensus is reached, and in response, forming a second sub-chain by adding the further data block to the data structure after said data block, the second sub-chain starting with said further data block.

Data access using sorted count mapping
11562026 · 2023-01-24 · ·

A method, a system, and a computer program product for accessing data. A data stream including a plurality of data elements is received. A mapping of the plurality of data elements is generated. Each data element is represented by a data node in the mapping. A linked list of the data nodes with starting and ending elements is generated. Each node is linked to at least another node and stores a count of a data element and the corresponding data element. The count represents a number of times the data element is present in the data stream. Each node is positioned in the generated linked list using the count of each data element. Data elements with a highest count are positioned proximate to the starting element and data elements with a lowest count are positioned proximate to the ending element. Data elements are accessed using the generated mapping.

GLOBAL SECONDARY INDEX METHOD FOR DISTRIBUTED DATABASE, ELECTRONIC DEVICE AND STORAGE MEDIUM

A global secondary index method for a distributed database, includes: obtaining original data to be written in response to a database writing request; writing the original data into the distributed database; performing global secondary index processing on the original data written into the distributed database to obtain global secondary index data; establishing global secondary index tables between the global secondary index data and data table primary keys in the distributed database; and writing the global secondary index tables into an index shards based on an asynchronous processing manner.

Processing queries using an index generated based on data segments
11704320 · 2023-07-18 · ·

A table organized into a set of batch units is accessed. A set of N-grams are generated for a data value in the source table. The set of N-grams include a first N-gram of a first length and a second N-gram of a second length where the first N-gram corresponds to a prefix of the second N-gram. A set of fingerprints are generated for the data value based on the set of N-grams. The set of fingerprints include a first fingerprint generated based on the first N-gram and a second fingerprint generated based on the second N-gram and the first fingerprint. A pruning index that indexes distinct values in each column of the source table is generated based on the set of fingerprints and stored in a database with an association with the source table.

RELATIONSHIP BUILDER TO RELATE DATA ACROSS MULTIPLE ENTITIES/NODES

A method for implementing a relationship builder to relate data across multiple entities of a database system, comprising the steps of: providing a set of data sets across multiple entities in the database system, wherein an entity comprises a set of structured data or a set of semi-structured data; identifying a set of relationships across the set of datasets without any prior schema knowledge of the set of data sets; testing and discarding relationships et of relationships across the set of datasets that are detected as a negative; referring a set of remaining relationships which have not been discarded as a set of tested possible relationships; validating the set of tested possible relationships by applying an initial filtering algorithms to remove any false positives comprising a distilled relation; and determining a set of tested possible relationships as comprising a set of true relationships applying a set of graph algorithms.