BLOCKCHAIN SYSTEM WITH SEVERABLE DATA AND CRYPTOGRAPHIC PROOF

    公开(公告)号:US20220035937A1

    公开(公告)日:2022-02-03

    申请号:US17450839

    申请日:2021-10-14

    Abstract: The present disclosure provides an approach for a blockchain system in which (a) data of past transactions can be removed from the storage of network nodes based on node permissions, and (b) in which data can be made invisible to users based on user-specific or group-specific permissions. The blockchain system stores cryptographic proofs of data on an immutable ledger. The data itself is maintained within the blockchain system such that it can be partially or fully removed, while maintaining the integrity of the ledger.

    BLOCKCHAIN SYSTEM WITH SEVARABLE DATA AND CRYPTOGRAPHIC PROOF

    公开(公告)号:US20200320204A1

    公开(公告)日:2020-10-08

    申请号:US16374364

    申请日:2019-04-03

    Abstract: The present disclosure provides an approach for a blockchain system in which (a) data of past transactions can be removed from the storage of network nodes based on node permissions, and (b) in which data can be made invisible to users based on user-specific or group-specific permissions. The blockchain system stores cryptographic proofs of data on an immutable ledger. The data itself is maintained within the blockchain system such that it can be partially or fully removed, while maintaining the integrity of the ledger.

    CONFIGURING RESOURCE-CONSTRAINED DEVICES IN A NETWORK

    公开(公告)号:US20200044918A1

    公开(公告)日:2020-02-06

    申请号:US16056012

    申请日:2018-08-06

    Abstract: A method is performed by a first fog node of a plurality of fog nodes. In some implementations, the first fog node includes a non-transitory memory and one or more processors coupled with the non-transitory memory. In some implementations, the method includes maintaining a distributed ledger in coordination with the remaining fog nodes of the plurality of fog nodes. In some implementations, the distributed ledger stores configuration information associated with one or more devices. In some implementations, the method includes obtaining a request for configuration information from a device that breaches a resource threshold associated with the distributed ledger. In some implementations, the method includes transmitting, to the device, the configuration information associated with the device in order to allow the device to be configured in accordance with the configuration information while the device breaches the resource threshold associated with the distributed ledger.

Patent Agency Ranking