Patent classifications
H04L67/104
Network node management on a blockchain
An example operation may include one or more of identifying application instances in a cluster group, receiving a request to perform a consensus decision regarding ownership of the cluster group via peer nodes of a blockchain, identifying individual consensus decision votes from the peer nodes, and performing the consensus decision based on the individual consensus decision votes.
Network node management on a blockchain
An example operation may include one or more of identifying application instances in a cluster group, receiving a request to perform a consensus decision regarding ownership of the cluster group via peer nodes of a blockchain, identifying individual consensus decision votes from the peer nodes, and performing the consensus decision based on the individual consensus decision votes.
Network-assisted consensus protocol
The concepts and technologies disclosed herein are directed to a network-assisted Raft consensus protocol, referred to herein as “NetRaft.” According to one aspect of the concepts and technologies disclosed herein, a system can include a plurality of servers operating in a server cluster, and a plurality of P4 switches corresponding to the plurality of servers. Each server of the plurality of servers can include a back-end that executes a complete Raft algorithm to perform leader election, log replication, and log commitment of a Raft consensus algorithm. Each P4 switch of the plurality of P4 switches can include a front-end that executes a partial Raft algorithm to perform the log replication and the log commitment of the Raft consensus algorithm. The back-end can maintain a complete state for responding to requests that cannot be fulfilled by the front-end. The requests can include read requests and/or write requests.
SYSTEMS AND METHODS FOR SIDE-CHANNEL-SECURE BLOCKCHAIN ANONYMITY USING I2P
A blockchain anonymizing system and method is provided for side-channel-secure blockchain anonymity using the Invisible Internet Project (I2P). Instead of merely preventing the revelation of a user's IP address, embodiments are directed to inhibiting any correlation of the user's transactions over time.
SYSTEMS AND METHODS FOR SIDE-CHANNEL-SECURE BLOCKCHAIN ANONYMITY USING I2P
A blockchain anonymizing system and method is provided for side-channel-secure blockchain anonymity using the Invisible Internet Project (I2P). Instead of merely preventing the revelation of a user's IP address, embodiments are directed to inhibiting any correlation of the user's transactions over time.
CRYPTO-SIGNED SWITCHING BETWEEN TWO-WAY TRUSTED NETWORK DEVICES IN A SECURE PEER-TO-PEER DATA NETWORK
In one embodiment, a method comprises: generating and maintaining, by a replicator device in a secure peer-to-peer data network, a secure private key and secure public key; establishing a two-way trusted relationship with a second replicator device for a pairwise topology of two-way trusted replicator devices; establishing a two-way trusted relationship with a first endpoint device based on validating a secure attachment request using the secure private key, and obtaining a second secure public key of the first endpoint device; validating, using the second secure public key, a secure data packet from the first endpoint device and destined for the second endpoint device, and obtaining information for reaching the second endpoint device via the second replicator device; and securely signing the secure data packet, received from the first endpoint device and destined for the second endpoint device, into a secure forwarded packet for secure transmission to the second replicator device.
Method and system for responding to video call service
The present disclosure provides a method for responding to video call service and system, including: receiving a video call service request by the video call device; calling a video call connection process to establish a video call data transmission link with the call peer based on a communication address; locally acquiring a target file as indicated by the file transmission request, and determining a link number of the file transmission link for transmitting the target file according to the communication address and a file type of the target file, if a file transmission request sent by the call peer is received; uploading the target file to a file push server through a file uplink if the link number is not included in a local link list; and transmitting the target file to the call peer through the file transmission link corresponding to the link number.
Synchronizing content
Some embodiments of the subject technology provide a novel system for synchronizing content items among a group of peer devices. The content synchronizing system of some embodiments includes the group of peer devices and a set of one or more synchronizing servers communicatively connected with the peer devices through one or more networks. In some embodiments, the synchronizing system uses a star architecture, in which each peer device offloads its synchronization operations to the synchronizing server set. Without establishing a peer-to-peer communication with any other peer device, the particular peer device in these embodiments supplies an encrypted content item set along with the N−1 encryptions of a content key used to encrypt the content item set to the synchronizing server set so that this server set can distribute the encrypted content item set and an encrypted content key to each of the N−1 peer devices.
Synchronizing content
Some embodiments of the subject technology provide a novel system for synchronizing content items among a group of peer devices. The content synchronizing system of some embodiments includes the group of peer devices and a set of one or more synchronizing servers communicatively connected with the peer devices through one or more networks. In some embodiments, the synchronizing system uses a star architecture, in which each peer device offloads its synchronization operations to the synchronizing server set. Without establishing a peer-to-peer communication with any other peer device, the particular peer device in these embodiments supplies an encrypted content item set along with the N−1 encryptions of a content key used to encrypt the content item set to the synchronizing server set so that this server set can distribute the encrypted content item set and an encrypted content key to each of the N−1 peer devices.
Electronic devices having embedded circuitry for accessing remote digital services
Systems and methods for accessing remote digital services by using embedded circuitry included in an electronic device.