Patent classifications
H04L67/104
Blockchain-based system and method for peer-to-peer online advertising auction
Method for online advertising auction on a peer-to-peer network includes: deploying a smart contract to publish a need from a consumer; receiving encrypted ad bids by the smart contract; storing the received ad bids in a hash function; reducing a number of ads that can be displayed by the consumer; transmitting the ad price to the consumer via the peer-to-peer computer network, when the hashed verification code is received from the consumer verifying that the consumer has viewed the ad content within an ad-viewing period of time; transmitting a difference between the advance payment and the ad price to the advertiser, by the smart contract via the peer-to-peer network; and ending the online advertising auction.
Content source verification and authentication using linked accounts
Disclosed are systems, methods, and non-transitory computer-readable media for content source verification and authentication using linked accounts. An authenticated group management system provides an improved approval process to create authenticated groups of linked accounts. In contrast to current systems in which a single gatekeeper reviews requests to add users to a group, the approval process utilized by the authenticated group management system enables each member of the authenticated group to review and respond to each request to add a prospective user. The more stringent approval process implemented by the authenticated group management system provides for a higher degree of authentication that each member of the authenticated group can be trusted, thereby increasing the security of content shared by the members of the authenticated group.
Efficient downloading of files to multiple users in proximity of one another
In one disclosed method, a computing system receives, from a first remote device, a first request for a file and determines that at least a second remote device is within a proximity of the first remote device. The computing system further divides the file into at least a first portion and a second portion. The computing system further sends, to the first remote device, the first portion of the file and sends, to the second remote device, the second portion of the file. The computing system further sends, to the second remote device, first data to enable the second remote device to establish a connection with the first remote device, for transfer of at least the second portion of the file to the first remote device via the connection with the second remote device.
AUTOMATIC COALESCING OF GPU-INITIATED NETWORK COMMUNICATION
Apparatuses, systems, and techniques are directed to automatic coalescing of GPU-initiated network communications. In one method, a communication engine receives, from a shared memory application executing on a first graphics processing unit (GPU), a first communication request assigned to or having a second GPU as a destination to be processed. The communication engine determines that the first communication request satisfies a coalescing criterion and stores the first communication request in association with a group of requests that have a common property. The communication engine coalesces the group of requests into a coalesced request and transports the coalesced request to the second GPU over a network.
PROVENANCE BASED IDENTIFICATION OF POLICY DEVIATIONS IN CLOUD COMPUTING ENVIRONMENTS
Policy deviations for distributed computing environments are detected and recorded an immutable ledger of transaction provenance from end to end transactions performed in the distributed computing environment. From the immutable ledger, persona data for transaction types is plotted as an bipartite graph. Edge weights of the bipartite graphs are correlated to trust levels between personas from the persona data and the transaction types from the immutable ledger. Trust levels from the edge weights are correlated to rules illustrating when the transaction provenance indicate a policy deviation in the distributed computing environment. The rules are then employed to detect in real time end to end provenance when a policy deviation in the distributed computing environment is occurring. An alert of policy deviations may be sent to stakeholders for the distributed computing environment.
SYSTEM AND METHOD FOR ENABLING ETL (EXTRACT-TRANSFORM-LOAD) AS A SERVICE
A system and method for enabling ETL (Extract-Transform-Load) as a service for data processing are disclosed. A user interface (UI) platform includes an input interface layer and an output interface layer. A receiver receives user input, via the input interface layer, of configuration details data corresponding to a desired data to be fetched from one or more data sources. A processor fetches the desired data from said one or more data sources based on the configuration details data to be utilized for the desired data processing scheme; automatically implements a transformation algorithm on the desired data corresponding to the configuration details data and the desired data processing scheme to output a transformed data in a predefined format; and transmits, via the output interface layer, the transformed data to downstream applications or systems in an end-to-end pipeline.
MOBILITY DATA STORAGE METHOD AND SYSTEM
A mobility data storage method executed by a plurality of vehicles each including a sensor and a processor coupled to the sensor, the processor of each of the plurality of vehicles being configured to store a local blockchain, the method includes, with the processor of the plurality of vehicles, attaching a sensor data pool, a random value that excess a threshold, and a verifiable random function (VRF) proof to a respective candidate block then broadcasting the candidate block to all other vehicles. Then, a particular candidate block whose random value is largest among the broadcasted candidate blocks is selected and verified with the VRF proof prior to be attached to the local blockchain.
Network-assisted scanning of a surrounding environment
A system, method and architecture for network-assisted scanning of a surrounding environment. In one example arrangement, the system is operative for receiving real world object identification and spatial mapping data relative to a plurality of real world scenarios sensed by sensing points, each operating as a collection agent configured to collect environmental data in association with a plurality of sensors. The data may be prioritized responsive to at least one of a determination of RAN resource capacity available to the collection agent, e.g., compute resources, storage resources, radio transmission resources, cost of the transmission capacity available to the collection agent, etc. in view of urgency/relevance of the data. Responsive to prioritizing the environmental data, one or more pieces of the environmental data may be transmitted to a nearest edge compute location and/or a cloud-based datacenter network node.
Network-assisted scanning of a surrounding environment
A system, method and architecture for network-assisted scanning of a surrounding environment. In one example arrangement, the system is operative for receiving real world object identification and spatial mapping data relative to a plurality of real world scenarios sensed by sensing points, each operating as a collection agent configured to collect environmental data in association with a plurality of sensors. The data may be prioritized responsive to at least one of a determination of RAN resource capacity available to the collection agent, e.g., compute resources, storage resources, radio transmission resources, cost of the transmission capacity available to the collection agent, etc. in view of urgency/relevance of the data. Responsive to prioritizing the environmental data, one or more pieces of the environmental data may be transmitted to a nearest edge compute location and/or a cloud-based datacenter network node.
Secure decentralized file sharing systems and methods
In an embodiment, a request for hosting a blockchain may be obtained from a client device. A node device to host the blockchain may be determined. Information associated with the node device may be provided to the client device, where the information is used for creating the blockchain on the node device. First data may be obtained from the client device and second data may be obtained from the node device for verifying that the node device hosting the blockchain complies with a hosting verification condition. Based on the first data, the second data, and the hosting verification condition, hosting information associated with the node device may be determined. Based on the hosting information, the node device may be removed from a set of node devices for hosting the blockchain.