Patent classifications
H04L67/1057
System and method for validating users in a virtual ecosystem based on stacking of digital resources
Embodiments of the present invention provide a system for validating users in a virtual ecosystem based on stacking of digital resources. The system is configured for identifying initiation of a resource interaction between a first user and a second user in a digital ecosystem, receiving a verification request from at least one of the first user and the second user, prompting the first user and the second user to provide digital resources, receiving first number of stacked digital resources from the first user and second number of stacked digital resources from the second user, calculating a first score for the first user based on the first number of stacked digital resources, calculating a second score for the second user based on the second number of stacked digital resources, and processing the resource interaction based on inputs received from the first user and the second user in the digital ecosystem.
Large-scale, time-sensitive secure distributed control systems and methods
Large-scale, time-sensitive secure distributed control systems and methods are disclosed. According to an aspect, a method includes detecting an anomaly at a module among a plurality of modules in a network. The method also includes adjusting a reputation level of the module associated with the detected anomaly. Further, the method includes controlling interaction of the module associated with the detected anomaly within the network based on the adjusted reputation level.
Recommendation schema for storing data in a shared data storage network
A shared data storage network, such as a peer-to-peer network, is managed according to individual member trust level. Members of the storage network make their local storage available to other members of the network. Members receive a storage-location recommendation based on (i) the type of data to be stored, and (ii) an individual trust level assigned to members providing storage resources in the network.
Selectively adding users to channels in a group-based communication system
Methods, media, and systems are disclosed for adding new users to a channel in a group-based communication system. The system receives a request to add new users to a channel. The system adds a new user by classifying the new user's email address domain as internal or external. If the domain is internal, the first user is added to the channel as a member, and if the domain is external, the user is prompted for a type of access for the new user. If the new user's access type is guest, the new user is added to the channel as a guest. If the type of access is shared, the channel is shared with an organization associated with the domain, and the new user is added as a member of the channel that has been shared.
Systems and methods for building blockchains for verifying assets for smart contracts
Systems and methods build blockchains and verify assets for smart contracts. A system includes a memory, a blockchain, a set of nodes, a set of verifiers, a set of miners, and a consensus protocol. The memory can have a block data structure representing a transaction for an asset having an identifier and at least one verifiable characteristic. The consensus protocol can include rules for: receiving the stake at risk from the verifiers, providing the reputational score to the verifiers, verifying the verifiable characteristic of the asset by the verifiers, cryptographic verification by the miners, adding the new block to the blockchain by the miners, providing the reward to the miners, and distributing the copy of the blockchain to each node.
Optimizing resource downloads or streams using a collection of trusted network connected endpoints
In an approach to improving resource downloads, one or more computer processors detect a request to download a resource from an original source to a user's computing device. The one or more computer processors determine a cost of the download of the requested resource from the original source. The one or more computer processors determine whether the cost of the download of the requested resource from the original source exceeds a predefined threshold. The one or more computer processors determine a group of trusted network connected endpoints. The one or more computer processors determine whether the requested resource exists in the group of trusted network connected endpoints. Responsive to determining the requested resource exists in the group of trusted network connected endpoints, the one or more computer processors download the requested resource from at least one of the trusted network connected endpoints.
RAFT CONSENSUS VICE LEADER OPTIMIZATION
Described is an improved system, method, and computer program product for performing elections in a computing system. Approaches are described for the non-leader member of a member set to self-identify to be the vice-leader. When it detects a death, rather than wait the random, bounded period, the vice-leader can immediately send its vote for me message to other members. This puts it ahead of the race by other members to announce their candidacies, and results in vastly more frequent conclusion of the election in the initial round.
OPTIMIZING RESOURCE DOWNLOADS OR STREAMS USING A COLLECTION OF TRUSTED NETWORK CONNECTED ENDPOINTS
In an approach to improving resource downloads, one or more computer processors detect a request to download a resource from an original source to a user's computing device. The one or more computer processors determine a cost of the download of the requested resource from the original source. The one or more computer processors determine whether the cost of the download of the requested resource from the original source exceeds a predefined threshold. The one or more computer processors determine a group of trusted network connected endpoints. The one or more computer processors determine whether the requested resource exists in the group of trusted network connected endpoints. Responsive to determining the requested resource exists in the group of trusted network connected endpoints, the one or more computer processors download the requested resource from at least one of the trusted network connected endpoints.