Patent classifications
H04L67/104
Methods and devices in a blockchain network
A first network device for use in a blockchain network is described. The first network device comprises means for, while carrying out a first iteration of a consensus protocol involving a second node device (103), in response to a trigger event (3040), obtaining a time interval function of a time interval start trigger event (3040) and of a time interval end trigger event (3080), each event being linked to a message of the consensus protocol and wherein at least the end trigger event (3080) comprises receiving a message from the second node device; means for transmitting (3083) first data (Delay_102) representative of said time interval to said second node device; means for, during a subsequent iteration of said consensus protocol involving said second node device, receiving a message (3140) from said second node device, said message containing second data (DelayTX_102) representative of said time interval from said second node device; means for authenticating said second node device as a function of said second data. A second network device, methods at the first and second network devices and a computer readable medium with code for carrying out the methods are also described.
Multi-user media presentation system
One or more embodiments of the disclosure provide systems and methods for providing media presentations to users of a media presentation system. A media presentation generally includes a plurality of media segments provided by multiple users of the media presentation system. In one or more embodiments, a user of the media presentation system may share a media presentation with a co-user. The media presentation system can provide a number of features to assist a user in sharing, filtering, and accessing media presentations.
Peer-level control of industrial automation system components
Embodiments of this present disclosure may include a system that includes a first network device. The first network device may perform an operation according to a device configuration file. The system may also include a second network device that directly communicatively couples to the first network device through a peer-to-peer (P-P) communication network. The second network device may include a backup file of the device configuration file. The second network device may transmit the backup file of the device configuration file to the first network device in response to detecting that the first network device is lacking the device configuration file.
Peer-level control of industrial automation system components
Embodiments of this present disclosure may include a system that includes a first network device. The first network device may perform an operation according to a device configuration file. The system may also include a second network device that directly communicatively couples to the first network device through a peer-to-peer (P-P) communication network. The second network device may include a backup file of the device configuration file. The second network device may transmit the backup file of the device configuration file to the first network device in response to detecting that the first network device is lacking the device configuration file.
RESOURCE DOWNLOAD IN PEER-TO-PEER NETWORKS
In one example in accordance with the present disclosure, a system is described. The system includes a resource splitter to determine a quantity of blocks to divide a resource to be downloaded. A transmitter of the system broadcasts, per block, an identification request through a peer-to-peer network to identify computing devices that have the block. A downloader of the system downloads blocks from other computing devices on the peer-to-peer network. The system also includes an assembler to re-assemble the resource from received blocks.
METHOD FOR TRACKING AND MANAGING A POWER SUPPLYING DEVICE VIA A BLOCKCHAIN-BASED SYSTEM
The present invention provides a method for tracking and managing power supplying devices and a blockchain-based system to perform such tracking and monitoring. The method comprises the steps of retrieving recorded characteristic data that is associated with an existing product identification from a blockchain, verifying such recorded characteristic data, generating a new product identification that is connected to the existing product identification and recording the new product identification and new characteristic data in the blockchain. The system comprises a blockchain and a middleware computer to perform the above-mentioned steps. Also provided herein is a blockchain-based system for monitoring and renting a power supplying device.
CROSS-CHAIN COLLABORATIVE GOVERNANCE SYSTEM, METHOD AND DEVICE AND STORAGE MEDIUM
A cross-chain collaborative governance system is configured to perform collaborative service and control governance on cross-chain interoperation between application subchains in a cross-chain alliance. The cross-chain collaborative governance system includes: a cross-chain access application layer configured to make a first application subchain and a second application subchain access the cross-chain collaborative governance system; a credible cross-chain collaborative layer configured to provide collaborative service for cross-chain interoperation between the first application subchain and the second application subchain; and a credible cross-chain governance layer configured to perform control governance on the cross-chain interoperation between the first application subchain and the second application subchain.
Systems and methods for secure peer-to-peer caching
Embodiments described include systems and methods for providing peer-to-peer caching among client applications. A cache coordinator is configured to receive a first request to register an object stored in a cache by a first client application including a first embedded browser. The first embedded browser obtains the object via a session established by the first embedded browser with a first network application on a server of a second entity. The cache coordinator is configured to store a location of the first client application and a hash of the object. The cache coordinator is configured to receive a second request from a second client application. The second request requests the location of the object among peer client applications. The cache coordinator is configured to communicate identification of the location of the first client application to the second client application for retrieving the object from the cache of the first client application.
Systems and methods for secure peer-to-peer caching
Embodiments described include systems and methods for providing peer-to-peer caching among client applications. A cache coordinator is configured to receive a first request to register an object stored in a cache by a first client application including a first embedded browser. The first embedded browser obtains the object via a session established by the first embedded browser with a first network application on a server of a second entity. The cache coordinator is configured to store a location of the first client application and a hash of the object. The cache coordinator is configured to receive a second request from a second client application. The second request requests the location of the object among peer client applications. The cache coordinator is configured to communicate identification of the location of the first client application to the second client application for retrieving the object from the cache of the first client application.
Group leader role queries
Examples include group leader role queries. Examples include detection of a loss of communication, via a first communication protocol, between first and second computing devices, transmission, via a second communication protocol, of a query for information about the second computing device currently having the group leader role. Examples further include a determine not to assume the group leader role with the first computing device based on receiving a response to the query via the second communication protocol from the second computing device.