Proof of dynamic quorum for blockchain consensus

    公开(公告)号:US11329800B2

    公开(公告)日:2022-05-10

    申请号:US16658118

    申请日:2019-10-20

    IPC分类号: H04L29/06 H04L9/06

    摘要: Proof-of-Dynamic-Quorum is a consensus mechanism for blockchain networks that selects a dynamic quorum of nodes to validate a proposed block based on digital data included in the proposed block. In an embodiment, a request to add a proposed block to a blockchain is received by a node of a blockchain network. A composite key value is generated based on one or more values within the proposed block. Based on a composite-key-value-to-quorum-participants mapping that is indicated in one or more blocks that are already present in the blockchain, a validating quorum is determined to determine whether the proposed block is to be added to the blockchain. When each node of the validating quorum indicates that the proposed block is accepted, the receiving node writes the proposed block to the blockchain. Proof-of-Dynamic-Quorum enables real-world authority data to be considered when performing a consensus algorithm in a blockchain network.

    TECHNIQUES FOR GENERATING PRE-EMPTIVE EXPECTATION MESSAGES

    公开(公告)号:US20220100737A1

    公开(公告)日:2022-03-31

    申请号:US17546972

    申请日:2021-12-09

    摘要: Techniques a provided for performing multi-system operations in which changes are asynchronously committed in multiple systems. Metadata about the multi-system operation is injected into the commit logs of one system involved in a multi-system operation. An event stream is generated based on the commit logs of the one system, and is used to drive the operations that one or more other systems need to perform as part of the multi-system operation. A reconciliation system reads the logs of all systems involved in the multi-system operation and determines whether the multi-system operation completed successfully. Techniques are also provided for using machine learning to generate models of normal execution of different types of operations, detect anomalies, pre-emptively send expectation messages, and automatically suggest and/or apply fixes.

    Multi-layered blockchain for digital assets

    公开(公告)号:US11121860B2

    公开(公告)日:2021-09-14

    申请号:US16233793

    申请日:2018-12-27

    发明人: Gautam Gupta

    IPC分类号: H04L9/06 H04L29/06

    摘要: An item is encrypted to create a unique hash-value for the item. From this hash-value, an item can be uniquely identified. The hash-value for the item is stored in a first blockchain. When the item is included in a transaction, a transaction entry is stored in a block of the first blockchain. When an item participates in a group of items, a group of items is formed. The group of items is encrypted to create a unique hash-value for the group of items. The hash-value for the group of items may be based on hash-values from the items included in the group of items. The hash-value for the group of items is stored in a second blockchain that is distinct from the first blockchain. When the group of items is included in a transaction, a transaction entry is stored in a block of a second blockchain.

    ENCRYPTION KEY ROTATION FRAMEWORK
    44.
    发明申请

    公开(公告)号:US20210184848A1

    公开(公告)日:2021-06-17

    申请号:US16711132

    申请日:2019-12-11

    摘要: Techniques are described herein for efficiently and expeditiously performing key rotation and key replacement. In an embodiment, a key replacement request is received that specifies one or more key names of a plurality of key names. A location-to-key-name mapping that maps the plurality of key names to a plurality of encrypted-data locations is used to determine one or more encrypted-data locations that are mapped to the one or more key names. A first set of messages is generated where each message identifies a table that is associated with the one or more encrypted-data locations. The first set of messages is stored in a queue for processing by a first plurality of worker processes. Each worker process of the first plurality of worker processes retrieves a message of the first set of messages from the queue and generates a message of a second set of messages that identifies a subset of encrypted data records from the table identified in the message of the first set of messages. Each message of the second set of messages is stored in a distinct queue which is assigned to a worker process of a second plurality of worker processes. Each worker process of the second plurality of worker processes retrieves the message from the assigned queue, decrypts the subset of encrypted data records identified in the respective message, re-encrypts the decrypted data records using a new encryption key that corresponds to a new key name, and stores the re-encrypted data records in a database.

    Authenticating and authorizing users with JWT and tokenization

    公开(公告)号:US10999272B2

    公开(公告)日:2021-05-04

    申请号:US15942266

    申请日:2018-03-30

    摘要: Techniques are provided for using tokenization in conjunction with “behind-the-wall” JWT authentication. “Behind-the-wall” JWT authentication refers to JWT authentication techniques in which the JWT stays exclusively within the private network that is controlled by the web application provider. Because the JWT stays within the private network, the security risk posed by posting the JWT in a client cookie is avoided. However, because JWT is used behind-the-wall to authenticate a user with the services requested by the user, the authentication-related overhead is significantly reduced.

    Techniques for performing multi-system computer operations

    公开(公告)号:US10114857B1

    公开(公告)日:2018-10-30

    申请号:US15833943

    申请日:2017-12-06

    IPC分类号: G06F17/30 G06N99/00

    摘要: Techniques a provided for performing multi-system operations in which changes are asynchronously committed in multiple systems. Metadata about the multi-system operation is injected into the commit logs of one system involved in a multi-system operation. An event stream is generated based on the commit logs of the one system, and is used to drive the operations that one or more other systems need to perform as part of the multi-system operation. A reconciliation system reads the logs of all systems involved in the multi-system operation and determines whether the multi-system operation completed successfully. Techniques are also provided for using machine learning to generate models of normal execution of different types of operations, detect anomalies, pre-emptively send expectation messages, and automatically suggest and/or apply fixes.