H04L9/0637

System and method for a computing environment for verifiable execution of data-driven contracts

A system and method for establishing a verified computing environment for executing data-driven contracts, comprising a cryptographic directed acyclic graph object model of a data-driven contract, wherein at least a subset of the objects in the MDAG correspond to clause state of at least one programmable clause of the data-driven contract; at a computing environment, administrating the data-driven contract in accordance with the MDAG which can include at least one execution instance comprised of: receiving a contract input to contract logic of the data-driven contract, processing the input according to the clause logic, in response to the contract input, generating at least one updated state object and generating at least one output object, and for each generated object, hash-linking the generated object to an object associated with the creation of the generated object.

Decentralized safeguard against fraud

A method includes acquiring, at a node server, blockchain data for a blockchain address on a blockchain network. The blockchain data includes a plurality of transactions for the blockchain address. The method includes generating a local node trust score for the blockchain address based on the blockchain data. The local node trust score indicates a likelihood that the blockchain address is involved in fraudulent activity. The method includes receiving, from a plurality of remote servers, a plurality of additional local trust scores for the blockchain address. The method includes determining a consensus trust score based on the local node trust score and the plurality of additional local trust scores. Additionally, the method includes receiving a trust request for the blockchain address from a requesting device and sending the consensus trust score for the specified blockchain address to the requesting device.

Systems, methods, and apparatuses for implementing commerce rewards across tenants for commerce cloud customers utilizing blockchain
11568437 · 2023-01-31 · ·

Systems, methods, and apparatuses for implementing commerce rewards across tenants for commerce cloud customers utilizing blockchain technologies in conjunction with a cloud based computing environment are described herein. For example, according to one embodiment there is a system having at least a processor and a memory therein executing within a host organization and having therein: means for operating a commerce cloud platform on behalf of a plurality of merchants, in which the commerce cloud platform provides at least customer payment processing on behalf of the plurality of merchants; receiving a first purchase transaction for an unknown customer from a first one of the plurality of merchants, in which the purchase transaction indicates transaction source information; creating a new global ID for the unknown customer and associating the purchase transaction and the transaction source information with the new global ID at the commerce cloud platform; allocating commerce rewards points to the unknown customer via the new global ID based on the first purchase transaction; receiving a second purchase transaction for the unknown customer from a second one of the plurality of merchants, in which the second purchase transaction indicates transaction source information for the second purchase transaction; prompting the unknown customer associated with the second purchase transaction to confirm they are associated with the first transaction based on at least a partial matching of the transaction source information associated with the first and second purchase transactions; and inviting the unknown customer to participate in a commerce rewards program to redeem the commerce rewards points. Other related embodiments are disclosed.

Blockchain compression using summary and padding blocks

Technologies for compressing a blockchain. In some examples, the technologies include removing selected blocks within a blockchain, and replacing the selected blocks with a summary block and a padding block. Each block of the selected blocks includes data in a certain state (such as data in an obsolete state). The technologies can include generating the summary block and padding blocks according to the data in the selected blocks and an original root hash included in the selected blocks and other blocks of the blockchain. The generating of the summary and padding blocks can include generating a new root hash in the summary and padding blocks that only replaces the original root hash in the summary and padding blocks. The generation of the new root hash can be based on a part of a header of a non-selected block of the blockchain directly linked to an end block of selected blocks.

Systems and methods for virtual distributed ledger networks

The disclosed embodiments relate to virtual distributed ledger networks provisioning using distributed ledger technology. In one embodiment, a system is disclosed, comprising a hardware processor and a memory device storing instructions executable by the hardware processor to perform operations. The operations comprise creating one or more virtual machines, and executing a plurality of microservices via the one or more virtual machines. At least two of the plurality of microservices are associated with different distributed ledger technology networks. The plurality of microservices include an event routing manager microservice configured to receive a smart contract microservice request and to route events between microservices, a smart contract execution microservice configured to execute a smart contract associated with the smart contract microservice request, and a transaction resource manager microservice configured to commit an outcome of the smart contract execution microservice to a distributed ledger associated with one of the different distributed ledger technology networks.

Distributed ledger systems and methods for importing, accessing, verifying, and comparing documents

Some implementations of the disclosure are directed to a method, comprising: retrieving, using a device associated with an entity, a document from a system of record; uploading the document for storage in an off-chain system accessible by entities having access to a distributed ledger of a distributed ledger network, the entities comprising the entity; hashing, using the device, one or more fields contained in the document to generate a hash representing a unique reference to the document; generating, using the device, a message comprising a plurality of fields contained in the document and the hash; digitally signing, by the device, using a private key associated with the entity, the message to endorse the hash and the fields contained in the document; and after digitally signing the message, transmitting, by the device, the message to the distributed ledger network to store the hash and the fields in the distributed ledger.

Secure cloud-based machine learning without sending original data to the cloud

Method and system for training a neural network. The neural network is split into first and second portions. A k-layer first portion is sent to a client training/inference engine and the second portion is retained by a server training/inference engine. At the splitting point, the kth layer is a one-way function in output computation has a number of nodes that are less than any other layer of the first portion. The client training/inference engine trains the first portion with input data in a set of training data. The server training/inference engine receives a batch of outputs from the client training and applies them to the second portion to train the entire neural network.

Low-latency direct cloud access with file system hierarchies and semantics

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications. For instance, POSIX interfaces and semantics may be layered on cloud-based storage, while providing access to data in a manner consistent with file-based access with data organization in name hierarchies. Various embodiments also may provide for memory mapping of data so that memory map changes are reflected in persistent storage while ensuring consistency between memory map changes and writes. For example, by transforming a ZFS file system disk-based storage into ZFS cloud-based storage, the ZFS file system gains the elastic nature of cloud storage.

Combined SBox and inverse SBox cryptography

Hardware circuitry defines logic for both Sbox generation and inverse Sbox generation via generating a multiplicative inverse matrix as a truth table for data. The hardware circuitry receives input plain text to be encrypted. The hardware circuitry divides the input plain text to be encrypted. The hardware circuitry feeds multiplicative inverse values generated from the input plain text to a transformer module for performing affine to encrypt the plain text data. The hardware circuitry receives encrypted data to be decrypted. The hardware circuitry divides the encrypted data to be decrypted. The hardware circuitry feeds multiplicative inverse generated from the encrypted data to the transformer module for performing inverse affine to decrypt the encrypted data.

Systems and methods for proving immutability of blockchains

The present disclosure provides systems, methods, and computer-readable storage media having functionality to prove immutability of blockchains without accessing user data. A user may submit data for storage to a data management server and the data management server may generate one or more data records corresponding to the data at a database and one or more blocks at a blockchain, each block corresponding to of the data records. Block information associated with the generated blocks may be transmitted to a remote computing device for storage at a database. Prior to storing the block information, the remote computing device may sign the data using a private key or other cryptographic technique. To validate a block, raw block information may be retrieved from the blockchain and compared to the signed block information. If the signed block information matches the raw block information, the block may be determined to be valid (e.g., unchanged).