DISTRIBUTED SEQUENTIAL TRANSACTIONAL DATABASE SELECTION

    公开(公告)号:US20220100739A1

    公开(公告)日:2022-03-31

    申请号:US17593622

    申请日:2020-03-18

    Abstract: A computer implemented method of provisioning a distributed sequential transactional database for a software application. The method includes receiving a descriptor for the application specifying characteristics of the database required for the application, accessing a registry of distributed sequential transactional databases and filtering the registry based on the descriptor to define a subset of databases, accessing each of at least some of the databases in the subset to verify an extent to which each accessed database complies with the characteristics in the descriptor, and associating a degree of compliance with each accessed database, such that databases in a subset of accessed databases having a degree of compliance meeting a threshold degree of compliance are determined to be compliant databases, and ranking the compliant databases in terms of the degree of compliance to select a database for access by the application.

    NETWORK PATH VERIFICATION
    12.
    发明申请

    公开(公告)号:US20250038963A1

    公开(公告)日:2025-01-30

    申请号:US18716567

    申请日:2022-11-21

    Abstract: A method of recording a network path in a network that includes a plurality of nodes is provided. The network path includes a source node, a destination node, and one or more intermediate nodes. The method includes receiving, at an intermediate node, a transaction, the transaction including a first cryptographic object and signatures of at least a subset of any preceding intermediate nodes in the network path; generating, by the intermediate node, a second cryptographic object based on the first cryptographic object; updating, by the intermediate node, the transaction with a signature of the intermediate node and with the second cryptographic object; and sending, from the intermediate node, the transaction to a succeeding node in the network path. Each cryptographic object allows the transaction to be verified up to the node that generated that cryptographic object. Nodes and a system for implementing the method are also provided.

    COMPUTER-IMPLEMENTED VALIDATION METHODS AND SYSTEMS

    公开(公告)号:US20240340648A1

    公开(公告)日:2024-10-10

    申请号:US18694829

    申请日:2022-08-23

    CPC classification number: H04W12/08 H04W12/106

    Abstract: A beacon device including directional transmission means transmits a challenge message in a first predetermined direction to each of one or more responder devices over a respective direct radio communication link, to invite the responder devices to each transmit a respective response message indicating knowledge of contents of the challenge message. The beacon device transmits one or more directed repetitions of the challenge message in one or more respective further predetermined directions such that data relating to the location of each of the responder devices can be inferred from timings of each response message with respect to times the challenge message and the directed repetitions of the challenge message were transmitted. The beacon device either engages in or eschews subsequent two-way communication with each of the one or more responder devices over the respective direct radio communication link, in dependence on the existence and timing of a respective response message.

    IDENTIFYING RELATIONSHIPS IN DATA
    14.
    发明公开

    公开(公告)号:US20240045962A1

    公开(公告)日:2024-02-08

    申请号:US18258766

    申请日:2021-12-07

    CPC classification number: G06F21/566 G06F40/279 G06F2221/034

    Abstract: A computer implemented method of clustering computer systems in a plurality of systems to identify computer systems being subject to a common security occurrence, each computer system generating data records corresponding to security events in respect the systems, the method comprising: receiving a set of one or more data records associated with each computer system, each record including a sequence of data fields; generate a vector embedding for each data field in each record; evaluate a distance of each vector embedding from a reference vector as an indicator of semantic distance; identifying similar data records based on a measure of a degree of similarity of the distances of vector embeddings for each record; defining a cluster of computer systems including computer systems associated with the similar data records for applying protective measures to the computer systems in the cluster.

    ANOMALOUS BEHAVIOR DETECTION IN A DISTRIBUTED TRANSACTIONAL DATABASE

    公开(公告)号:US20220083654A1

    公开(公告)日:2022-03-17

    申请号:US17310018

    申请日:2019-12-18

    Inventor: Jonathan ROSCOE

    Abstract: A computer implemented method of anomalous behavior detection of an entity transacting in a distributed transactional database, the method including: selecting a subset of features of at least a first subset of transactions in the database as a feature set; generating a statistical model of the first subset of transactions in terms of the selected features; identifying a second subset of transactions in the database including transactions related to the entity; generating an encoded representation of each transaction in the second subset of transactions based on a comparison of the selected features of the transaction with the statistical model, such that the encoded representation of at least some of the transactions in the second subset of transactions identify behavior of the entity as anomalous.

    IMPROVEMENTS TO DIGITAL TRANSACTIONS USING QUANTUM TECHNOLOGY

    公开(公告)号:US20230327861A1

    公开(公告)日:2023-10-12

    申请号:US17995175

    申请日:2021-03-22

    CPC classification number: H04L9/0852 H04B10/70

    Abstract: There is herein provided a method of quantum communication, the method comprising: indicating to a quantum receiving apparatus that a first sequence of mutually non-orthogonal bases will be used to prepare at least some of a plurality of bits in quantum states, at a quantum transmitting apparatus, preparing each of the plurality of bits in a respective one of a second sequence of mutually non-orthogonal bases, to give a plurality of qubits, wherein the second sequence of mutually non-orthogonal bases is different to the first sequence of mutually non-orthogonal bases.

    IDENTIFYING DERIVATIVES OF DATA ITEMS
    17.
    发明公开

    公开(公告)号:US20230274406A1

    公开(公告)日:2023-08-31

    申请号:US18246221

    申请日:2021-09-27

    CPC classification number: G06T7/0002 H04L9/50 G06V10/56

    Abstract: A computer implemented method of determining an association between disparate first and second data items wherein the second data item is at least partly derived from the first data item, the method comprising: evaluating a cryptographic hash to each result of each of a plurality of disparate feature extraction methods, each feature extraction method being applied to each of the first and second data items to generate a set of hashes for each data item; responsive to a non-empty set of hashes in the intersect of the sets of hashes for each data item, identifying an association between the first and second data items.

    EVOLUTIONARY NETWORK RE-CONFIGURATION
    18.
    发明公开

    公开(公告)号:US20230216744A1

    公开(公告)日:2023-07-06

    申请号:US18000860

    申请日:2021-06-02

    CPC classification number: H04L41/145 H04L41/5025 H04L41/40

    Abstract: A computer implemented method of adapting a configuration of a software defined network to improve a measure of network performance towards an objective measure of performance, the network including a plurality of network nodes communicating via the network, the method including each node applying an evolutionary algorithm to generate a candidate adjusted configuration for the network and, responsive to a determination that the candidate provides an improvement to the measure of network performance, the node storing the candidate in a distributed database accessible to the nodes for access by other nodes; each node accessing candidate adjusted configurations in the distributed database and determining a performance of the network provided by each accessed candidate, wherein each node records the determined performance provided by a candidate in the database in association with the candidate, such that a candidate adjusted configuration providing a greatest improvement to the measure of network performance is selected by the nodes for adapting the configuration of the network.

    DATA INTERCEPTION PROTECTION
    19.
    发明申请

    公开(公告)号:US20230118093A1

    公开(公告)日:2023-04-20

    申请号:US17905543

    申请日:2021-02-23

    Abstract: A computer implemented method to protect data input to a user input device from detection, the device including an artificial haptic feedback mechanism arranged to generate an occurrence of haptic feedback for sensing by a user of the device in response to each input gesture on the device by the user, wherein at least a subset of each occurrence of haptic feedback is adjusted with respect to a previous occurrence of haptic feedback by one or more of: a timing of the haptic feedback with respect to a time of occurrence of a corresponding input gesture; an adjustment to a duration of haptic feedback relative to a duration of the previous occurrence of haptic feedback; and a generation of one or more addition occurrences of haptic feedback.

    CONFIGURING DISTRIBUTED SEQUENTIAL TRANSACTIONAL DATABASES

    公开(公告)号:US20220147513A1

    公开(公告)日:2022-05-12

    申请号:US17593623

    申请日:2020-03-18

    Abstract: A computer implemented method of configuring a distributed sequential transactional database for a software application operating with the database. The method including receiving a descriptor for the application specifying characteristics of the database required for the application and accessing the databases to determine an extent to which each the database complies with the characteristics in the descriptor. The method further including, responsive to the determination, identifying one or more attributes of the database for adjustment based on the characteristics in the descriptor so as to improve the extent of compliance of the database with the characteristics in the descriptor, the one or more attributes being determined by a machine learning algorithm trained to categorize database characteristics in terms of suitable adjustments, and adjusting the database in accordance with the determined attributes.

Patent Agency Ranking