摘要:
The invention proposes a network transactional system, comprising a set of token nodes (TN), a set of user nodes (UN) and a set of provider nodes (PN), the nodes being capable of executing an executable contract for a user node to obtain token account units (Voucher Tokens) by reserving (R) reserve account units according to a value of the token units which itself varies according to the reserve, the number of token units in circulation and the reserve ratio (RR). A provider node is associated with each token node and the token is representative of a product or asset (good, service, right or other benefit) of the provider, or a group of such products or assets. When a user node provides account units necessary to obtain token units from a given token node at the current value, the system is capable of transferring a first portion of said reserve account units to the reserve of the given token node, and transferring a second portion of said reserve account units outside the reserve, and performing reverse transfers when token units are returned to the given token node, so as to limit or neutralize the value variations of the token unit when said token units are received and returned. Application including the generation of interchangeable local tokens without undesirable value variations related to reserve mechanisms such as Bancor.
摘要:
A transaction system based on a distributed peer-to-peer computer architecture, said system involving transactions generated by users by means of wallets and allowing the transfer of units of account by feeding inputs from outputs, each transaction (called downstream transaction) having an input directly or indirectly referring to an output of an upstream transaction (or several inputs each referring to an output of a respective upstream transaction) and having an output specifying the number of units of account and an address of a recipient. The system comprises means for connecting an input of a downstream transaction to an output of an upstream transaction as a function of matching rules between a code computed on all or part of the content of the downstream transaction and a check code contained in the upstream transaction, or conversely, The system further comprises means for propagating a contract, predetermined at an upstream transaction, to a downstream transaction having an input connected to the output of said upstream transaction, said contract being executable on a context for establishing allocation constraints of the output(s) of the downstream transaction, such allocation being authorized only if the constraints are met.
摘要:
In a first aspect, the invention relates to a method implemented in a computer environment for identifying enrichment information relative to starting information, characterised in that the method comprises the following steps: (a) accessing via a network a first information source in order to collect first information in response to a first request; (b) converting said first information into a first set of data structured according to a plurality of first attributes; (c) applying context information to a mapping source in order to identify at least one second source of information capable of providing information that can be used for enriching the first information; (d) accessing via the network the second source of information in order to collect therefrom second information in response to a second request containing one or more criteria contained in the first request and/or one or more attribute values of the first set of structured data; (e) converting said second information into a second set of data structured according to a plurality of second attributes, at least some of which are linked to first attributes by inter-attribute mapping information provided by the mapping source; and (f) presenting the data including data of the first data set and data of the second data set combined according to said mapping information.
摘要:
A method is described which is used in a computer environment in order to produce a current view from at least one source information object that can vary. The method is characterized in that it includes the following steps: a reference of the view in relation to the source information object is established and stored; a user implements at least one information object modification tool in order to produce a transformed information object from the source information object; a difference information set that is representative of the modification actions performed by the user with the tool(s) is recorded in a memory element; and a current view is produced from the current version of each source information object and said difference information set.
摘要:
The invention concerns a method for accessing a resource in a computer environment, the resource comprising a set of objects. The invention is characterized in that the computer environment is adapted to store in association with at least one object of said resource at least one modified object, in that said computer environment comprises means for storing in association with such an object information concerning degree of elaboration, and in that it includes the following steps: identifying, for each object of the resource to which corresponds at least one modified object, based on data concerning degree of elaboration, at least one most elaborated version of said object; assembling the objects thus identified for display in the resource. The invention also concerns other methods for accessing to resources as well as resources structured therefor.
摘要:
A method manages information resources in a computer system. The method includes receiving user information from an input device. The user information is representative of a declaration that a second resource accessible by the system should be associated with a first resource. The method further includes storing in association with the second resource an identifier of the first resource. The method identifies other resources that are relevant with respect to the second resource using a relevance scoring process. The method further determines whether the second resource with respect to other relevant resources has a first identifier associated herewith when one of the other resources is to be accessed by the system for display, and if it does, displays signaling information distinct from the display of the other resource itself signaling of the existence of the first resource.
摘要:
Method for the secure execution of programs (smart contracts) implemented between a first wallet node (WN) (WN1) and a second wallet node (WN2), at least the second WN being implemented in an enclave of a processor, and the WNs being capable of executing programs designated in the messages that reach them, the method comprising the following steps: a) sending by WN1 to WN2 of a pre-message; b1) in response to this pre-message, execution in the enclave of a first program (WNRoT); b2) generation by the enclave of a certificate of authenticity of said first program and of the integrity of its execution; b3) sending said certificate to WN1; c) verification by WN1 of said certificate; d) in the event of successful verification, sending by WN1 to WN2 of a message intended to trigger the execution of a given program in WN2, and e) execution of said program in WN2.
摘要:
The invention relates to a method of managing commitments between entities forming the nodes of a network, each entity being housed in a computer processing unit, characterized in that it comprises the following steps: establishing commitments (ENij) between commitment provider entities (Ei) and commitment beneficiary entities (Ej), one and the same entity being able to be both a commitment provider in relation to one or more other commitment beneficiary entities and a commitment beneficiary in relation to other commitment provider entities, upon the default of an commitment on the part of a defaulting commitment provider entity, noted from a beneficiary entity benefiting from this same commitment, communicating to the provider entity from said beneficiary entity, and at least one other entity (upstream entity) whose defaulting provider entity is beneficiary, an indication of default of a commitment, and, in response to this communication, altering at least one commitment whose defaulting provider entity is beneficiary. The invention is also aimed at various systems and methods capable, in a secure manner, of implementing programs or commitments which are executable at the level of a set of nodes of a network, for various applications.
摘要:
Method for accessing a resource in a data-processing environment. The resource includes a set of objects. The data-processing environment is capable of storing in association with at least one object of the resource at least one modified object. The data-processing environment is capable of storing in association with such an object information of degree of elaboration. The method performs the steps of identifying, for each object of the resource to which corresponds at least a modified object, by using the information of degree of elaboration, at least a most elaborate version of said object, and assembling the objects thus identified for them to be displayed in the resource.
摘要:
A method manages information resources in a computer system. The method includes receiving user information from an input device. The user information is representative of a declaration that a second resource accessible by the system should be associated with a first resource. The method further includes storing in association with the second resource an identifier of the first resource. The method identifies other resources that are relevant with respect to the second resource using a relevance scoring process. The method further determines whether the second resource with respect to other relevant resources has a first identifier associated herewith when one of the other resources is to be accessed by the system for display, and if it does, displays signaling information distinct from the display of the other resource itself signaling of the existence of the first resource.