H04L67/1078

Computer-implemented system and method for controlling processing steps of a distributed system
11811866 · 2023-11-07 · ·

A method of controlling and coordinating of processing steps in a distributed system can be implemented by an initiator node of a cyclically-ordered set of nodes participating in a blockchain network (e.g., Bitcoin blockchain). The method includes generating a private key and cryptographic shares thereof for the nodes of the set and distributing them. A locking value is determined based on the shares and a transaction is arranged to transmit control of a resource responsive to supply of a corresponding unlocking value. A circuit of transactions amongst the nodes each arranged to transmit control of a resource responsive to supply of an unlocking value corresponding to a locking value determined based on the share distributed to a first node of one of two adjacent nodes and a value received from another node immediately previous to it is prepared. The initiator node may belong to a cyclically-ordered set of initiator nodes.

Visualizing network traffic plans based on egress peer engineering

A traffic planning platform may receive information related to a traffic flow including a traffic bandwidth to transport through a network with various network devices interconnected by links. The traffic planning platform may generate a traffic plan by assigning the traffic flow to a set of the links that includes network resources connecting a source of the traffic flow to a destination of the traffic flow. The traffic planning platform may render a visualization of the traffic plan, wherein the visualization includes a user interface (e.g., a diagram, an animation, and/or the like) in which geometric shapes that represent the source, the peer link, and the destination are connected by bands that represent the tunnel and the external route and further in which the geometric shapes and the bands each have a first visual property and a second visual property based on the traffic bandwidth of the traffic flow.

SYSTEMS AND METHODS FOR MOBILE PEER-TO-PEER CONTENT SHARING
20230354031 · 2023-11-02 ·

System and methods are disclosed that enable data sharing across networks, including peer-to-peer sharing of content over wireless networks using peer mobile devices. A database may store content associated with a first peer mobile device. A request from a requester peer mobile device for content associated with a user of the first peer mobile device may be received at a server. The encrypted request is transmitted by the server to the first peer mobile device which may decrypt the request. An authorization token may be transmitted by the first peer mobile device to the server which may then enable the requesting peer mobile device to access the requested content, which may be accessed from the first peer mobile device and/or a cloud storage system.

System for identity-based exposure detection in peer-to-peer platforms

Systems, computer program products, and methods are described herein for identity-based exposure detection in peer-to-peer (P2P) platforms. The present invention is configured to receive, from a computing device of a P2P platform, an indication that a user has initiated a P2P resource transfer request to a first entity; retrieve, from a computing device of the P2P platform, resource transfer information of the first entity based on at least the P2P resource transfer request; initiate a database query on a P2P knowledge repository using the resource transfer information of the first entity; determine a match between the resource transfer information of the first entity and at least one entity record in the P2P knowledge repository based on at least initiating the database query; and transmit a notification to the computing device of the P2P platform indicating that the first entity is known to be associated with misappropriate activity.

SYSTEMS AND METHODS FOR DOWNLOADING FILES
20230344895 · 2023-10-26 ·

One disclosed method involves receiving, by a first application executing on a first client device, a link to download a file from a computing system, presenting, by the first application and via the first client device, a user interface element that, when selected, causes the first application to request a second application executing on a second client device to initiate a process for downloading the file from the computing system using the link, in response to detecting selection of the user interface element, sending, by the first application, a request to the second application to initiate the process, and receiving, by the first client device, the file that the second application caused download of from the computing system using the link.

Peer-to-peer delta image dispatch system
11803514 · 2023-10-31 · ·

In an example embodiment, a solution is used to provide for a highly efficient image dispatch system for container-based in-memory databases in a database-as-a-service framework that provides storage and bandwidth cost savings and introduces advanced features of container techniques. This solution makes best use of the advantages of the concurrent and distributed capabilities of in-memory databases in a database-as-a-service framework. A container operator manager provides operators for various uses, such as the “diff” operator and the “merge” operator. A dispatch manager acts as a centralized service for diff content maintenance, patch publication and management of dispatch worker nodes. A patch worker on each node has the capabilities to execute the specified patching and validation between the images located on each side of the in-memory database in the database-as-a-service framework.

DATA SYNCHRONIZATION ACROSS MULTIPLE DEVICES

One embodiment provides for an electronic device, comprising a non-transitory machine-readable medium to store instructions, one or more processors to execute the instructions, and a memory coupled to the one or more processors. The memory can be configured to store a set of synchronization data associated with interaction between the electronic device and one or more applications and instructions which, when executed by the one or more processors, configure the one or more processors to retrieve a set of synchronization data to be transmitted from the electronic device to select a transport channel from one of a peer-to-peer channel or a network-based channel and transmit the set of synchronization data from the electronic device to one or more remote devices via the selected transport channel.

Systems and methods for mobile peer-to-peer content sharing

System and methods are disclosed that enable data sharing across networks, including peer-to-peer sharing of content over wireless networks using peer mobile devices. A database may store content associated with a first peer mobile device. A request from a requester peer mobile device for content associated with a user of the first peer mobile device may be received at a server. The encrypted request is transmitted by the server to the first peer mobile device which may decrypt the request. An authorization token may be transmitted by the first peer mobile device to the server which may then enable the requesting peer mobile device to access the requested content, which may be accessed from the first peer mobile device and/or a cloud storage system.

Providing selective peer-to-peer monitoring using MBeans

Providing selective peer-to-peer monitoring using MBeans by providing a federation of peer-to-peer network servers based on the MBeans, and enabling each of the peer-to-peer networks servers to selectively monitor data associated with at least a subset of the peer-to-peer network servers using at least one of the MBeans.

SYSTEM FOR IMPLEMENTING DYNAMIC MULTI-FACTOR SOFT LOCK ON USER IDENTIFIERS

Systems, computer program products, and methods are described herein for implementing dynamic multi-factor soft lock on user identifiers. The present invention is configured to receive, from a first user input device, a network registration request from a user to obtain authorization to execute resource transfers within a distributed network using a first user identifier; query, using an information retrieval engine, metadata associated with the user within the distributed network for traceable instances of digital activities of the user; determine one or more user identifiers based on at least the metadata associated with the user; execute, using an authentication subsystem, a soft lock on the one or more user identifiers; approve authorization for the user to execute the resource transfers within the distributed network using the first user identifier; and transmit control signals configured to cause the first user device to display the authorization.