G06F16/1837

Isolating And Reinstating Nodes In A Distributed Ledger Using Proof Of Innocence
20230050048 · 2023-02-16 ·

Aspects of the disclosure relate to isolating and reinstating nodes in a distributed ledger using proof of innocence. In some embodiments, a first plug-in embedded with the blockchain network may monitor consumer-initiated transactions submitted to an enterprise organization node to determine the legitimacy of each consumer-initiated transaction. The first plug-in may identify consumer-initiated transactions associated with malicious activity and may flag the consumer node for further analysis. A second plug-in may identify and analyze the consumer-initiated transactions associated with the consumer node to determine a proof of innocence value associated with the consumer node. The first plug-in may isolate the consumer node from the distributed ledger if the proof of innocence value exceeds a proof of innocence threshold. Alternatively, the first plug-in may permit the consumer node to remain within the distributed ledger if the proof of innocence value falls below the proof of innocence threshold.

File control for data packet routers using consensus and inter-planetary file system (IPFS)

Packet routers route data packets based on existing topology files. The packet routers hash the existing topology files into content-addressed objects and exchange the content-addressed objects. One of the routers modifies its topology file into a new topology file, hashes the new topology file into a new content-addressed object, and transfers the new content-addressed object to the other packet routers. The packet routers exchange the content-addressed objects, and in response, exchange the topology files. The routers establish a consensus on the new topology file based on the existing topology files. The one packet router routes additional data packets based on the new topology file in response to the consensus. In some examples, the content-addressed objects comprise Inter-Planetary File System (IPFS) objects.

Community Internet Drive
20180013621 · 2018-01-11 ·

Provided herein are devices, systems, methods and various means, including those related to providing a community internet drive that may utilize a centrally-managed hub as well as storage devices distributed among various networked machines. In some embodiments, the community internet drive can also include features to enable its users to promote and utilize the user's trusted personal relationships while also enabling an open platform for peer-to-peer and/or other types of sharing schemes.

Distributed ledger systems and methods for importing, accessing, verifying, and comparing documents

Some implementations of the disclosure are directed to a method, comprising: retrieving, using a device associated with an entity, a document from a system of record; uploading the document for storage in an off-chain system accessible by entities having access to a distributed ledger of a distributed ledger network, the entities comprising the entity; hashing, using the device, one or more fields contained in the document to generate a hash representing a unique reference to the document; generating, using the device, a message comprising a plurality of fields contained in the document and the hash; digitally signing, by the device, using a private key associated with the entity, the message to endorse the hash and the fields contained in the document; and after digitally signing the message, transmitting, by the device, the message to the distributed ledger network to store the hash and the fields in the distributed ledger.

SYSTEM AND METHOD FOR DETERMINING A VOLATILE FILE BASED ON A SELECTION FACTOR

An apparatus for sorting and ordering data based on filtering parameters comprises a memory operable to store a digital folder and a processor operably coupled to the memory. The processor is configured to receive a transmission comprising verification of an interaction session established between a first user and an entity and to receive file information corresponding to one or more files stored in the digital folder from an external exchange. The processor is further configured to generate a file vector comprising the one or more files of the digital folder that is sorted based on applying a selection factor to the received file information for each of the one or more files. The processor is further configured to send a transmission to a user device comprising the file vector and an indication to utilize a first file of the file vector during the interaction session.

Blockchain ledger validation and service
11699310 · 2023-07-11 · ·

Disclosed are systems and techniques for using blockchain technology to maintain and validate a vehicle ledger. The technique includes receiving, at a master node in the system, a request to update a vehicle ledger associated with a first vehicle node comprising the system. If first criteria are met, the system updates the vehicle ledger, including: generating an updated version of the vehicle ledger using vehicle data stored in a master ledger associated with the master node, and transmitting the updated version of the vehicle ledger to the first vehicle node. If the first criteria are not met, the system forgoes updating the vehicle ledger. The vehicle data corresponds to a first vehicle associated with the first vehicle node. The master ledger is implemented using a blockchain that contains vehicle records for vehicles associated with the system. The blockchain includes a first block including vehicle data corresponding to the first vehicle.

Enhanced tracking of data flows

Disclosed are various embodiments for tracking the flow of data through a network environment. A monitor can detect that a data transaction event has occurred. Then, the monitor can identify data involved in the data transaction event. Next, a trace identifier can be assigned to the data involved in the data transaction event. Subsequently, a transaction data subset representing a subset of the data involved in the data transaction event that is subject to a common data processing event can be identified. Then, a span identifier can be assigned to the transaction data subset. Next, a correlation identifier can be link to a combination of the span identifier and the trace identifier. Finally, a transaction event record can be written to a distributed ledger, the transaction event record comprising the span identifier and the transaction data subset.

Service flow system and service data processing method and apparatus

Embodiments of the present disclosure relate to a service flow system and a service data processing method and apparatus. The system can include a management server, a distributed storage cluster and a block chain alliance network connected by a network, the block chain alliance network including a consensus node and at least one participant node. Through unified management of a management server, off-chain data is stored in a distributed storage cluster, then participants of each phase are defined for different projects, and the participants of the same phase of the same project share the same on-chain and off-chain data. Therefore, credible access of the participants to block chain data is solved, dynamic customizable phase management of the projects in a service flow is supported, the on-chain data and participants of each phase are strictly divided and managed, and associated management of on-chain and off-chain service flow data is also supported.

Dampening token allocations based on non-organic subscriber behaviors
11593721 · 2023-02-28 · ·

Described processes include: determining portions of instances of a cryptographic token to be allocated to record providers, like providers of an asset indicated by a record, wherein: the portions are determined based on network effects associated with the records the record provider supplied on performance of a computer-implemented network in which both record providers and record consumers participate, patterns indicative of inorganic consumption may be determined from one or more of interactions of individual consumers, interactions of collections of consumers, or consumer interactions in the aggregate for a given provider or record; and the effects on network performance are adjusted responsive to designation of one or more entities as exhibiting inauthentic behavior; and appending to a distributed ledger, records indicating the respective portions, and adjustments, are allocated to record providers.

Permissionless blockchain consensus method with adjusting block weight, system and P2P network

An permissionless blockchain consensus method with adjusting block weight, comprising: setting weights of all blocks in the permissionless blockchain to the same initial value; determining parent edges(forward reference-edges) of any one of blocks in the permissionless blockchain according to the blockchain topology; detecting whether a first judgment block x is in blocks contained by the parent edge of a block b; if yes, determining that the block b is an unstable block and transferring to next step, otherwise, determining the block b is a stable block and transferring to a pivot chain consensus step; and detecting whether a second judgment blocky is in the stable block contained by the parent edge of the block b; if yes, determining the block b is a readjusted block and transferring to a weight adjustment step, otherwise, determining the block b is a stable block and transferring to the pivot chain consensus step.