Patent classifications
H04L9/3297
Multi-client transaction validation
An example operation may include one or more of identifying a plurality of instances of a blockchain storage request that have been independently submitted by a plurality of clients, respectively, verifying whether execution content of the plurality of instances of the blockchain storage request match, and in response to verifying the match, storing the blockchain storage request within a block among a hash-linked chain of blocks.
Method and system for optimization of data storage for distributed ledgers
A method for optimizing blockchain storage size through use of relative values includes: receiving, by a blockchain node in a blockchain network that manages a blockchain, a plurality of blockchain data values, each including unspent transaction outputs, at least one destination address, and, for each destination address, an original currency amount; identifying a base value; modifying the original currency amount included in each blockchain data value to be a relative currency amount based on a difference between the identified base value and the original currency amount; generating a new block, the new block including a block header and the modified plurality of blockchain data values; and transmitting the generated new block to a plurality of additional nodes in the blockchain network.
Secure streaming of real-time location data between electronic devices
Embodiments described herein provide for system and methods to enable the secure streaming of real-time location data between electronic devices. One embodiment provides for a non-transitory machine-readable medium storing instructions to perform operations comprising creating record to specify a location streaming relationship between a first device registered with a first user account and a second device registered with a second online account, the record including a secret key. The record is stored to an online datastore and shared between the first user account and the second online account. The location data stream can be encrypted using the secret key stored in the record.
Automated monitoring of proximate devices
Aspects of the disclosure relate to an automated monitoring of proximate devices. A computing platform may cause a reporting device to detect a target device in a local network, retrieve network data associated with the target device, and send, to an intermediate server, the network data. The computing platform may send, to the intermediate server, a query. The intermediate server may send the network data in response to the query. Based on the network data, the computing platform may determine an amount of time that has elapsed since network activity was previously detected for the target device, and based on a determination that the amount of time exceeds a predetermined time threshold, the computing platform may generate an alert notification indicating that the target device may need to be traced. Subsequently, the alert notification may be sent to the reporting device.
SYSTEM AND METHOD FOR MANAGING TRANSACTIONS IN DYNAMIC DIGITAL DOCUMENTS
A system software and method which relates to the field of computing technology or business process models or computer systems or distributed computer systems or computer networks relating to general purpose devices that can be programmed to carry out a set of data table or hash table updates, validations or modifications supporting, enabling or executing public and private services, financial transactions and commercial applications. More specifically, the present invention is directed to distributed and decentralized computing in which said distributed network is supported and encrypted by cryptographic technology, hash functions and distributed public or private keys or other related technology. System and methods for managing dynamic electronic documents on a private distributed ledger comprise establishing a dynamic electronic document comprising a first state object, wherein the state object references a prior approved first transaction; proposing a second transaction comprising as an input the first state object and as an output a transaction command to alter the state object as well as what parameters are required to validate the second transaction; validating the proposed second transaction; and updating the state object on a private distributed ledger to reference the second transaction.
SYSTEM AND METHOD FOR SECURE PEER-TO-PEER TRANSMISSION OF CONTENT IN DISTRIBUTED LEDGER NEWORKS
Different aspects of the invention implement an enhanced DLT system, and corresponding method, that allows the peer-to-peer transmission of huge amounts of data packets of content between users, and to be stored in the DLT network, in a secure, trustworthy and efficient manner. By allowing the interface between any type of existing layer 1 DLT network, it does not require the complex, slow, costly and highly risk process involved in the generation of a new layer 1 DLT network. It opens up the range of possible applications of the DLT network to applications in Big Data, IOT, Web 3, MMOG, or any other environment that needs the trust provided by the immutability of data stored in the DLT network.
Validation of Security Device Authentication in a Decentralized Network
Systems and methods to perform validation of authentication of a security device in a decentralized network are disclosed. In one aspect, embodiments of the present disclosure include a method which can be implemented on a system to, identify telemetry associated with the successful authentication. The telemetry is further in a distributed ledger in the decentralized network and can be used to determine validity of an authentication attempt of the security device by a second user device.
Enforcing multi-use constraints on a blockchain
A blockchain configuration may be used to store a distributed ledger for information security and accessibility. One example method of operation may include one or more of logging an asset in a blockchain, identifying a sub-asset linked to the asset, creating a use constraint for the sub-asset, logging the use constraint associated with the sub-asset, and during an access attempt of the sub-asset, prohibiting access to the sub-asset based on the use constraint.
Ensuring information fairness and input privacy using a blockchain in a competitive scenario governed by a smart contract
An example operation may include one or more of initializing a smart contract (SC) and appending it to a blockchain, registering each of a plurality of participants as a party to the SC, receiving from at least some of the participants an encrypted confidential input commitment, appending the encrypted input commitments to the blockchain, decrypting the encrypted input commitments, executing by the SC at least one business rule using the decrypted input commitments to obtain a business rule result, and identifying a prevailing participant based at least in part on the business rule result.
Location-based access to controlled access resources
Systems and methods provide access to location-restricted resources outside of recognized locations. An example, a method includes receiving a request for a controlled access resource from a client device and determining that the request is not associated with a recognized location but that state data exists for the client device identifier. In response to identifying the state data, the method includes generating a link for accessing the controlled access resource at a server, generating an encrypted token including a timestamp, a random number, and licensed resource information from the state data, including the encrypted token in the link, and providing the link to the client device. The client device uses the link to request the controlled access resource from the server, which determines that the request includes the token, determines that the token is not expired, and provides the controlled access resource to the client device.