H04L67/1057

Mechanism to identify link down reasons
11582297 · 2023-02-14 · ·

Methods, systems, and devices are provided herein for a mechanism to identify link down reasons. As described herein, a first port of a first peer device may be determined to have unexpectedly changed to a port down state. Subsequently, a topology file may be referenced to identify a second port of a second peer device with which the first peer device is intended to have a link if not for the first port being in a port down state. In some examples, port settings of the first port may be compared with port settings of the second port. If a port setting for the first port mismatches an associated port setting for the second port, an alert message may be transmitted to a network administrator indicating this mismatch as a possible reason for the first port being in the port down state.

MECHANISM TO IDENTIFY LINK DOWN REASONS
20230231906 · 2023-07-20 ·

Methods, systems, and devices are provided herein for a mechanism to identify link down reasons. As described herein, a first port of a first peer device may be determined to have unexpectedly changed to a port down state. Subsequently, a topology file may be referenced to identify a second port of a second peer device with which the first peer device is intended to have a link if not for the first port being in a port down state. In some examples, port settings of the first port may be compared with port settings of the second port. If a port setting for the first port mismatches an associated port setting for the second port, an alert message may be transmitted to a network administrator indicating this mismatch as a possible reason for the first port being in the port down state.

METHOD AND SYSTEM FOR ESTABLISHING TRUST BETWEEN NODES IN A NETWORK BASED ON RECOMMENDATIONS
20220345523 · 2022-10-27 ·

Techniques described herein relate to a method for managing nodes. The method may include sending, by a first node of nodes, a node information request to a social manager, where the node information request specifies a portion of a service to be provided to the first node; obtaining node information associated with a portion of the nodes from the social manager, where the portion of the plurality of nodes previously expressed node capability information and node configuration information associated with the portion of the service; identifying a second node of the portion of the nodes based on the node information to perform the portion of the service; and performing the service using the second node, where the second node performs the portion of the service.

Adaptive team training evaluation system and method

A computer-implemented adaptive group training method a computer accessing a virtual system and initiating a group training exercise for training a trainee group comprising one or more trainees, the group training exercise including one or more challenges to the virtual system, each of the one or more challenges including a pre-defined sequence of one or more injectable events; the computer controlling subsequent execution of the group training exercise comprising injecting the injectable events; and the computer evaluating performance of the trainee group during the subsequent execution of the group training exercise, including analyzing actions taken by the trainee group in response to each of the injections, and attributing one or more of the actions taken to a trainee.

Method and system for establishing trust between nodes in a network based on recommendations

Techniques described herein relate to a method for managing nodes. The method may include sending, by a first node of nodes, a node information request to a social manager, where the node information request specifies a portion of a service to be provided to the first node; obtaining node information associated with a portion of the nodes from the social manager, where the portion of the plurality of nodes previously expressed node capability information and node configuration information associated with the portion of the service; identifying a second node of the portion of the nodes based on the node information to perform the portion of the service; and performing the service using the second node, where the second node performs the portion of the service.

SELECTIVELY ADDING USERS TO CHANNELS IN A GROUP-BASED COMMUNICATION SYSTEM
20220060540 · 2022-02-24 ·

Methods, media, and systems are disclosed for adding new users to a channel in a group-based communication system. The system receives a request to add new users to a channel. The system adds a new user by classifying the new user's email address domain as internal or external. If the domain is internal, the first user is added to the channel as a member, and if the domain is external, the user is prompted for a type of access for the new user. If the new user's access type is guest, the new user is added to the channel as a guest. If the type of access is shared, the channel is shared with an organization associated with the domain, and the new user is added as a member of the channel that has been shared.

SYSTEMS AND METHODS FOR BUILDING BLOCKCHAINS FOR VERIFYING ASSETS FOR SMART CONTRACTS

Systems and methods build blockchains and verify assets for smart contracts. A system includes a memory, a blockchain, a set of nodes, a set of verifiers, a set of miners, and a consensus protocol. The memory can have a block data structure representing a transaction for an asset having an identifier and at least one verifiable characteristic. The consensus protocol can include rules for: receiving the stake at risk from the verifiers, providing the reputational score to the verifiers, verifying the verifiable characteristic of the asset by the verifiers, cryptographic verification by the miners, adding the new block to the blockchain by the miners, providing the reward to the miners, and distributing the copy of the blockchain to each node.

Sharding block chain generation method based on tree structure
11375010 · 2022-06-28 · ·

Disclosed is a sharding block chain generation method based on a tree structure. Method comprises: dividing a server system into at least one group, and respectively selecting a leader of each group; packaging to generate at least one block by leader according to an own local database state, and broadcasting at least one block to all members of group in which leader is located; verifying consistency of at least one block, executing block according to a verification result of consistency, and synchronizing block to other groups. According to method, by means of tree grouping architecture, efficiency of generating block by a block chain framework is improved, block is generated according to own local database state of the leader, a resource waste phenomenon when block is generated in system is reduced, and delay when the block is generated is reduced.

MINIMIZING THE IMPACT OF MALFUNCTIONING PEERS ON BLOCKCHAIN
20220182443 · 2022-06-09 ·

A computer-implemented system and related method address malfunctioning peers in a blockchain, the method comprising receiving endorsement results from peers in the blockchain, where the endorsement results are for one or more transactions in the blockchain. The endorsement results include successful and failed endorsements. The method further comprises distributing the successful and failed endorsements to two or more endorsement collectors, determining which peers are successful endorsement peers (SEPs) that provided successful endorsements, and which peers are failed endorsement peers (FEPs) that provided failed endorsements. A reputation score is calculated for each peer based on endorsement information from the endorsement collectors. The reputation score is then sent to at least one of a client and a system administrator. This reputation score is then used to determine peer selection in a subsequent transaction.

METHODS AND SYSTEMS FOR PRIVACY PRESERVING INFERENCE GENERATION IN A DISTRIBUTED COMPUTING ENVIRONMENT
20220129771 · 2022-04-28 ·

Certain aspects of the present disclosure provide techniques for performing inferences in a distributed computing environment. An example method generally includes receiving a request to perform an inference with respect to a set of input data. One or more client devices are selected for use in performing the inference with respect to the set of input data. A request to perform the inference is transmitted to the selected one or more client devices. The request generally includes an anonymized, vectorized version of the set of input data such that the selected one or more client devices are to perform the inference based on anonymized data. An inference response is received from each of the selected one or more client devices. An aggregated inference response is generated based on the inference response received from each respective client device of the selected one or more client devices and a reputation score associated with the respective client device, and the aggregated inference response is output to a requesting service.