DATA REUSE COMPUTING ARCHITECTURE
    1.
    发明公开

    公开(公告)号:US20240346241A1

    公开(公告)日:2024-10-17

    申请号:US18582882

    申请日:2024-02-21

    摘要: Disclosed is an improved computer architecture for generating an electronic form by having a user input a portion of form data and obtaining the remaining portion of the format data from a data storage that stores reusable data for various forms. A master data object is configured to store “request-agnostic data,” which is typically that portion of form data that does not differ, or is common, between various forms. The data that differs between various forms, such as the data that is specific to a form, may be considered as “request-specific data.” When a form generation request is received, the user may be prompted to input request-specific data, but not the request-agnostic data. The system automatically obtains the request-agnostic data from the master data object, and integrates the request-agnostic data with the request-specific data to generate the form.

    ENSURING DATA INTEGRITY OF EXECUTED TRANSACTIONS

    公开(公告)号:US20240265000A1

    公开(公告)日:2024-08-08

    申请号:US18409289

    申请日:2024-01-10

    摘要: A central service provider manages a blockchain network that writes the cryptographic hash of each executed transaction in a block to the blockchain network. For each executed transaction, the central service provider generates and transmits a transaction receipt such that a party can verify that the transaction was appropriately executed. Additionally, a party can check that the party's records are correct by providing transaction data describing details of transactions recorded in the party's records to the central service provider. The central service provider verifies the party's records by comparing the transaction data in the party's records to the blocks of transaction records in the blockchain network. In some scenarios, the central service provider may identify or receive an identification of a discrepancy arising from one or more transactions. The central service provider can reconcile the identified discrepancy.

    FIREWALL DRIFT MONITORING AND DETECTION
    3.
    发明公开

    公开(公告)号:US20240137341A1

    公开(公告)日:2024-04-25

    申请号:US18399786

    申请日:2023-12-29

    IPC分类号: H04L9/40

    摘要: The present application relates to embodiments for detecting firewall drift. In some embodiments, a first set of firewall rules of a first firewall for a first instance of a distributed application, a second set of firewall rules of a second firewall for a second instance of the distributed application, and a mapping of IP addresses to identifiers of services from amongst a first set of services of the first instance and a second set of services of the second instance may be obtained. First connectivity data and second connectivity data may be generated indicating, for each of IP address associated with the first and second set of firewall rules, a respective port number over which communications between a respective IP address are transmitted, and generating comparison data indicating whether firewall drift is detected based on a comparison of the first connectivity data and the second connectivity data.

    APPLICATION SCENARIO INJECTION AND VALIDATION SYSTEM

    公开(公告)号:US20240118991A1

    公开(公告)日:2024-04-11

    申请号:US17961905

    申请日:2022-10-07

    IPC分类号: G06F11/36

    CPC分类号: G06F11/3644 G06F11/3608

    摘要: Provided is a method including identifying one or more injection points in a flow of an application and determining that a first injection point of the one or more injection points permits scenario injection. The method further includes injecting first scenario source code for a first scenario function at the first injection point in source code of the application and storing the application including the first scenario source code for the first scenario function. The method further includes receiving instruction to activate the first scenario function, activating the first scenario function. Furthermore, the method includes running the application when the first scenario function is activated, such that the running the application when the first scenario function is activated causes the application to operate concurrently with the first scenario function and providing a first application output.

    Systems and methods for real-time processing

    公开(公告)号:US11442780B2

    公开(公告)日:2022-09-13

    申请号:US17384182

    申请日:2021-07-23

    发明人: Brian Blank

    IPC分类号: G06F9/50

    摘要: A method for real-time data processing is described. The method being implemented on a computer system having one or more physical processors programmed with computer program instructions which, when executed, perform the method. The method comprising allocating a real-time dataset associated with a real-time data interaction to a node in a chain of nodes, wherein each node is representative of a user in the real-time data interaction; setting a node status of the node for the real-time dataset to pending; and independently of (i) a node status of the one or more upstream nodes and (ii) a node status of the one or more downstream nodes: periodically determining, by the computer system, an availability status of the node; and in response to the availability status satisfying the criterion, setting the node status for the real-time dataset as settled.

    SYSTEMS AND METHODS FOR IMPLEMENTING A PLATFORM FOR INVESTING

    公开(公告)号:US20210366046A1

    公开(公告)日:2021-11-25

    申请号:US17397222

    申请日:2021-08-09

    IPC分类号: G06Q40/06

    摘要: In some embodiments, a request may be received from a customer via an interface, wherein the request indicates (i) a social media stream associated with the customer to be monitored for instances of investment triggering content (ITC). A customer account of the customer may be configured based on the request. The social media stream may be monitored for instances of ITC based on the customer account configuration. Responsive to the monitoring detecting an instance of ITC, a first amount may be withdrawn from the customer account, and a purchase of a quantity of shares of an investment fund may be executed on behalf of the customer using the withdrawn first amount.

    Managing verifiable, cryptographically strong transactions

    公开(公告)号:US11165754B2

    公开(公告)日:2021-11-02

    申请号:US15625951

    申请日:2017-06-16

    摘要: A central service provider manages verifiable and cryptographically strong transactions in a block chain network. For each transaction, the central service provider maintains and updates one or more directed graphs that describe the traceable positions of an asset held by parties of the block chain network. Therefore, transactions can be reconciled by tracing along the directed graphs. The central service provider also leverages crypto-hashing to enforce the immutability of each executed transaction. For example, each transaction is cryptographically hashed and written into a block in the block chain. Each transaction refers to a cryptographic hash of a prior transaction and each block refers to a cryptographic hash of a prior block. Therefore, the executed transactions are cryptographically strong in that if a single transaction is altered, then the entire block of transactions including the transaction is invalidated.

    API HUB ARCHITECTURE
    10.
    发明申请

    公开(公告)号:US20210096938A1

    公开(公告)日:2021-04-01

    申请号:US17060580

    申请日:2020-10-01

    IPC分类号: G06F9/54 H04L29/06

    摘要: An application programming interface (API) hub architecture establishes relationships among the provisioning systems, the IAM target systems, and an intermediate API hub system. A provisioning system can send the API hub system a message in a format associated with the IAM system. The API hub determines and identifies which of one or more available IAM systems should receive the message. The API hub system translates the message into a correct format for each of the determined target IAM systems and sends the translated messages to the appropriate target systems. Similarly, the API hub system can receive a message from an IAM system, identify, based on the message, which of one or more provisioning systems should receive the message, translate the message into an appropriate format for each of the determined one or more provisioning systems, and send the formatted message to the determined provisioning systems.