Patent classifications
H04L9/34
SYSTEMS AND METHODS FOR STORING AND SHARING TRANSACTIONAL DATA USING DISTRIBUTED COMPUTER SYSTEMS
A computer system that interfaces with a blockchain is provided. The computer system receives match data for a match between a first data transaction request that is associated with a first identifier and a second data transaction request that is associated with a second identifier. A first blockchain transaction is generated based on the match data and stored to a blockchain. At least one further blockchain transaction is generates that splits the match into two different transactions—one between the first identifier and an intermediary and the second between the intermediary. These are recorded to the blockchain via the further blockchain transactions.
BIT LEVEL SHARDING OF SENSITIVE DATA FOR INCREASED SECURITY
Techniques for obfuscating and/or de-obfuscating data using bit-level shard masks are disclosed. Shard masks are generated. The shard masks are designed to shard a block of data into a number of shards for distribution and storage among a number of storage arrays. The shard masks shard the block of data at a bit-level granularity. The shard masks are applied to the block of data to generate the shards. The shards are then distributed among the storage arrays for storage on the storage arrays.
BIT LEVEL SHARDING OF SENSITIVE DATA FOR INCREASED SECURITY
Techniques for obfuscating and/or de-obfuscating data using bit-level shard masks are disclosed. Shard masks are generated. The shard masks are designed to shard a block of data into a number of shards for distribution and storage among a number of storage arrays. The shard masks shard the block of data at a bit-level granularity. The shard masks are applied to the block of data to generate the shards. The shards are then distributed among the storage arrays for storage on the storage arrays.
SYSTEM AND METHOD FOR INTERACTION OBJECT MANAGEMENT IN A BLOCKCHAIN ENVIRONMENT
A system and method for block management of interactions comprising a network-connected block management computer connected to a plurality of connected devices and to one or more blockchains to enable an object compiler to receive a plurality of criteria from a requesting device. The compiler the receives a plurality of blocks from the blockchains based on the criteria. Each block corresponding to a preconfigured interaction object previously written by devices either during or after the completion of a transaction. The compiler analyzes the preconfigured interaction objects to determine if there is corresponding supplemental object. The compiler requests the supplemental blocks from the blockchains, and processes supplemental objects based on type, if no corresponding supplemental object it found, the associated interaction object is flagged.
SYSTEM AND METHOD FOR INTERACTION OBJECT MANAGEMENT IN A BLOCKCHAIN ENVIRONMENT
A system and method for block management of interactions comprising a network-connected block management computer connected to a plurality of connected devices and to one or more blockchains to enable an object compiler to receive a plurality of criteria from a requesting device. The compiler the receives a plurality of blocks from the blockchains based on the criteria. Each block corresponding to a preconfigured interaction object previously written by devices either during or after the completion of a transaction. The compiler analyzes the preconfigured interaction objects to determine if there is corresponding supplemental object. The compiler requests the supplemental blocks from the blockchains, and processes supplemental objects based on type, if no corresponding supplemental object it found, the associated interaction object is flagged.
Decentralized cybersecure privacy network for cloud communication, computing and global e-commerce
Software installed in the nodes in a communication network allows them to perform a “name server” function, which entails the management of a dynamic list of the client devices that are connected to the cloud, a “task” function, which entails the receipt and transmission of the packets, and an “authority” function, which entails the determination of the routes of the packets through the cloud. Each node is capable of performing only one function at a time. After completing a job, a node reverts to an undifferentiated, state awaiting its next performance request.
Decentralized cybersecure privacy network for cloud communication, computing and global e-commerce
Software installed in the nodes in a communication network allows them to perform a “name server” function, which entails the management of a dynamic list of the client devices that are connected to the cloud, a “task” function, which entails the receipt and transmission of the packets, and an “authority” function, which entails the determination of the routes of the packets through the cloud. Each node is capable of performing only one function at a time. After completing a job, a node reverts to an undifferentiated, state awaiting its next performance request.
Smart compressor based on adaptive CPU/QAT scheduling method
A method, apparatus, and system for assigning the execution of a cryptography and/or compression operation on a data segment to either a central processing unit (CPU) or a hardware accelerator is disclosed. In particular, a data segment on which a cryptography and/or compression operation is to be executed is received. Status information relating to a CPU and a hardware accelerator is determined. Whether the operation is to be executed on the CPU or on the hardware accelerator is determined based at least in part on the status information. In response to determining that the operation is to be executed on the CPU, the data segment is forwarded to the CPU for execution of the operation. On the other hand, in response to determining that the operation is to be executed on the hardware accelerator, the data segment is forwarded to the hardware accelerator for execution of the operation.
Smart compressor based on adaptive CPU/QAT scheduling method
A method, apparatus, and system for assigning the execution of a cryptography and/or compression operation on a data segment to either a central processing unit (CPU) or a hardware accelerator is disclosed. In particular, a data segment on which a cryptography and/or compression operation is to be executed is received. Status information relating to a CPU and a hardware accelerator is determined. Whether the operation is to be executed on the CPU or on the hardware accelerator is determined based at least in part on the status information. In response to determining that the operation is to be executed on the CPU, the data segment is forwarded to the CPU for execution of the operation. On the other hand, in response to determining that the operation is to be executed on the hardware accelerator, the data segment is forwarded to the hardware accelerator for execution of the operation.
METHOD AND SYSTEM FOR DETECTING MANUFACTURING PROCESS BREACHES IN MANUFACTURING OF THREE-DIMENSIONAL PARTS
The invention concerns a method and system for manufacturing a three-dimensional part by a computer-aided manufacturing process, and an associated method and system for detecting a manufacturing process breach in a computer-aided manufacturing process of a three-dimensional part.
The three-dimensional part manufacturing comprises computing pedigree information (10) relating to the manufacturing process of the three-dimensional part, wherein the pedigree information (10) gives access to pedigree data of the manufacturing process of the three-dimensional part, the pedigree data comprising manufacturing data (8D) collected during the manufacturing process of the three-dimensional part, and inserting a mark (20) encoding the pedigree information on a surface or within a volume of the three-dimensional part, to obtain a marked three-dimensional part (24).
The detection of manufacturing process breach comprises pedigree data (42) retrieval from a marked three-dimensional part and determining whether a manufacturing breach occurred by applying classifying means to the retrieved pedigree data.