Patent classifications
H04L67/1046
Remote blockchain masternode deployment
A remote blockchain masternode deployment system including a light client that can deploy a remote masternode without requiring the masternode owner to lose control of the funds staked at the masternode using a transaction identifier including a transaction hash and an index instead of a transfer of locked funds on the blockchain to an address controlled by a party other than the masternode owner. The masternode owner can unilaterally dismantle the masternode and recover the staked funds by spending the staked funds to another address controlled by the masternode operator. A pingless activation allows the masternode owner to “click and run” after funding the masternode without having to wait for the funding transaction to become buried before broadcasting an activation message. A staking vault performs staking functions for the owner in a way that does not allow unilateral spending of staked funds by the vault.
Human-cyber-physical resource-oriented adaptive construction method and apparatus for structured P2P network
A human-cyber-physical resource-oriented adaptive construction method and apparatus for a structured peer-to-peer (P2P) network are provided. The structured P2P network is a point-to-point network with physical perception information and can be effectively used in a human-cyber-physical fusion scenario. The method includes: using a grid aggregation algorithm to calculate the latitude and longitude coordinates of a new node to acquire a position hash value of the new node; determining, according to the position hash value, a registration node of the new node from the existing nodes of the structured P2P network; and completing, according to the information returned by the registration node to the new node, registration of the new node, thereby resulting adding of the registered new node into the structured P2P network.
HIERARCHICAL RESOURCE CONSTRAINED NETWORK
System and techniques for a hierarchical resource constrained networks are described herein. Device participating in the network are divided into groups. These groups correspond to vertices in a routing graph. A leader is selected amongst the devices in each group to function as a routing node connecting to other vertices of the routing graph. Client devices attach to leaf vertices in the routing graph. To reduce overhead in placing devices into the routing pools, a distributed hash table (DHT) can be used. Here, the routing pools can be given DHT IDs based on, for example, a structure of the routing graph. Device DHT IDs are used to assign them to the routing pools based on a distance metric. Routing, in this arrangement, can use the DHT IDs to efficiently compute routing pool hops when routing messages. This arrangement works well for publication-subscription (pub-sub) services.
AUTOMATIC OUTPUT OF DOCUMENT
An example image forming apparatus includes a communication interface device, a print engine, a processor, and a memory that stores instructions executable by the processor. The processor may execute the instructions, as an automatic document output function is performed, to detect access of a user terminal through the communication interface device, based on detecting the access of the user terminal, obtain a document to be automatically output using setting information of the automatic document output function, and output the obtained document by using the print engine.
Information processing apparatus and non-transitory computer readable medium storing program for service invitation
An information processing apparatus includes an extracting unit that extracts, based on attribute information of an object necessary for using a service provided by a service system and information related to a user of the service system, a candidate for the user to be invited to the service, out of users who are yet to use the service.
Measuring the performance of a peer-managed content distribution network
A system and method are provided for measuring the performance of a synthetic peer-managed content distribution network. Each node peers with one or more other nodes to share the content and facilitate its presentation to associated users. Each node collects session metadata for identifying the node's environment, presentation events regarding presentation of the content to users, and transfer events regarding the sharing of the content among peers. The nodes report their data toward a central entity that feeds the different types of data through different ETL pipelines to obtain the performance measurements. For example, the session metadata may allow the reach of a content item to be determined, the presentation events may be used to determine the quality of experience with the content item for users, and the transfer events may be used to determine how much external bandwidth the network conserved and/or how efficiently the nodes shared the content.
Geolocation-based data sharing system
A geolocation-based data sharing system and method which enables end users to connect and share electronic data of any form based on the users' interaction with geolocation points established by other users. The systems and method can be used to enable end users to share data, text, photos, music, etc. when a second user positions himself or herself in a position assigned by a first user.
INTERNET OF THINGS
- Ned M. Smith ,
- Keith Nolan ,
- Mark Kelly ,
- Gregory Burns ,
- Michael Nolan ,
- John Brady ,
- Cliodhna Ni Scanaill ,
- Niall Cahill ,
- Thiago Macieira ,
- Zheng Zhang ,
- Glen J. Anderson ,
- Igor Muttik ,
- Davide Carboni ,
- Eugene Ryan ,
- Richard Davies ,
- Toby M. Kohlenberg ,
- Maarten Koning ,
- Jakub Wenus ,
- Rajesh Poornachandran ,
- William C. Deleeuw ,
- Ravikiran Chukka
The Internet can be configured to provide communications to a large number of Internet-of-Things (IoT) devices. Devices can be designed to address the need for network layers, from central servers, through gateways, down to edge devices, to grow unhindered, to discover and make accessible connected resources, and to support the ability to hide and compartmentalize connected resources. Network protocols can be part of the fabric supporting human accessible services that operate regardless of location, time, or space. Innovations can include service delivery and associated infrastructure, such as hardware and software. Services may be provided in accordance with specified Quality of Service (QoS) terms. The use of IoT devices and networks can be included in a heterogeneous network of connectivity including wired and wireless technologies.
Multi-tenant marketplace architectures
A method for managing entities in a multi-tenant marketplace architecture system is discussed. The method includes determining that a merchant is represented as a first representation in a first hierarchical data structure and as a second representation in a second hierarchical data structure, where both the first and second hierarchical data structures are managed by a first service provider. The merchant is being managed via a full representation in an original hierarchical data structure by a marketplace service provider. The first and second representations provide outbound services via the first hierarchical data structure and via the second hierarchical data structure, respectively. The method also includes linking the first representation with the second representation to configure the first and second representations for propagating results of an inbound service applied to one of the first and second representations to a remaining one of the first and second representations.
Secure forum facilitator in controlled environment
An forum facilitator device is provided that allows for a controlled environment to provide a secure forum for residents to provide communications to other registered users of the secure forum. The communications are provided through posts made in the secure forum and through other types of communications from the inmate such as but not limited to emails and text messages. The forum facilitator device operates the secure forum and implements rules to control what is posted on the secure forum, who is able to access the secure forum, and what entities are allowed to view and interact with residents of the controlled environment.