Patent classifications
H04L2463/121
Blockchain integration for scalable distributed computations
An apparatus is configured to initiate distributed computations across a plurality of data processing clusters associated with respective data zones, to utilize local processing results of at least a subset of the distributed computations from respective ones of the data processing clusters to generate global processing results, and to update at least one distributed ledger maintained by one or more of the plurality of data processing clusters to incorporate one or more blocks each characterizing at least a portion of the distributed computations. Each of at least a subset of the data processing clusters is configured to process data from a data source of the corresponding data zone using one or more local computations of that data processing cluster to generate at least a portion of the local processing results. At least one of the data processing clusters is configured to apply one or more global computations to one or more of the local processing results to generate at least a portion of the global processing results.
DECENTRALIZED OUT-OF-BAND ACCELERATED BLOCKCHAIN TRANSACTION PROCESSING
An example operation may include one or more of identifying a blockchain transaction requiring commitment processing for commitment to a blockchain, determining the blockchain transaction is delayed, responsive to identifying the blockchain transaction is delayed, creating a transaction acceleration smart contract defining an incentive for performing the commitment processing of the blockchain transaction, and storing the transaction acceleration smart contract blockchain in a different blockchain.
SYSTEM AND METHOD FOR ENABLING THE SECURE STORAGE, TRANSMISSION AND ACCESS OF GENETIC DATA
A system and method for a computer system for the secure storage, transmittance and access of genetic data includes a coordinator server including a coordinator program arranged to update secure access information, the coordinator server being in communication with a genetic data sequencing server, a genetic data analysing server, and a genetic data storage server, whereby the coordinator server communicates the secure access information in a manner to allow the genetic data storage server to act as a proxy server between the genetic data sequencing server and the genetic data analysing server.
Systems and methods for in-session refresh of entitlements associated with web applications
The described technology provides a capability to perform in-session updates to entitlements associated with a user's access to content served by a web application. The content may be from one or more external servers. The technology provides for automatically detecting changes to entitlements, and without requiring a user of an active session to initiate a new session, updating entitlement data in a memory such that subsequent requests for data made by the client in the same active session are serviced using the updated entitlements.
Automated granting of access to networks and services for pre-paid devices
Herein are methods and systems for automated assessment of user devices and associated data, and granting access to wireless networks based on the assessment. For example, the systems and methods assess a user request for access to a wireless network at an access point, and automatically determine the type of access to be granted based on at least a loyalty score associated with the user. The automatic assessment can be used to encourage customer loyalty as well as to manage limited network resources.
Automated granting of access to networks and services for pre-paid devices
Herein are methods and systems for automated assessment of user devices and associated data, and granting access to wireless networks based on the assessment. For example, the systems and methods assess a user request for access to a wireless network at an access point, and automatically determine the type of access to be granted based on at least a loyalty score associated with the user. The automatic assessment can be used to encourage customer loyalty as well as to manage limited network resources.
Protecting local network devices against attacks from remote network devices
Disclosed approaches for protecting against attacks on a network device, a second network device receives a first message from a first network device. In response to the first message, the second network device determines a first area from which the first network device issued the message. The second network device determines whether or not the first area intersects a second area having the second network device. In response to determining that the first area intersects the second area, the second network device acknowledges the first message to the first network device. In response to determining that the first area does not intersect the second area, the second network device rejects the first message.
SYSTEM AND METHOD FOR TRACKING AND ARCHIVING MOBILE COMMUNICATIONS
A system for tracking electronic communications of a subscriber includes a gateway configured to track a communication between a mobile device and a subscriber mobile device that has a subscriber software module associated with a subscriber business number. The gateway is configured to send the communication to an Enterprise Information Archiving system. The gateway also is configured to: (i) if the communication is sent from the subscriber software module intended for the mobile device, send the communication to the mobile device via at least one of an SMS, MMS, and voice communication capability of the mobile device; and (ii) if the communication is sent from the mobile device to the subscriber business number via at least one of an SMS, MMS, and voice communication capability of the mobile device, send the communication to the subscriber software module associated with the subscriber business number.
ANNOTATION OF EVENT DATA TO INCLUDE ACCESS INTERFACE IDENTIFIERS FOR USE BY DOWNSTREAM ENTITIES IN A DISTRIBUTED DATA PROCESSING SYSTEM
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is big data driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.
Method, Computer-Readable Medium, System, and Vehicle Comprising the System for Validating a Time Function of a Master and the Clients in a Network of a Vehicle
A method for validating a time function in a network of a vehicle includes: ascertaining a receiving time of a sync message of a master; receiving a follow-up message of the master; ascertaining a receiving time of a further sync message of the master; receiving a further follow-up message of the master; determining a time function of the first client based on the receiving time of the sync message, the receiving time of the further sync message, the transmission time of the follow-up message, and the transmission time of the further follow-up message; ascertaining a synchronized transmission time of a path delay request message from the first client to the master; ascertaining a synchronized receiving time of a path delay response message from the master; receiving a path delay response follow-up message from the master by the first client; and validating a time function of the master.