Hybrid Lease For Primary Election

    公开(公告)号:US20220066811A1

    公开(公告)日:2022-03-03

    申请号:US17462477

    申请日:2021-08-31

    Applicant: Google LLC

    Abstract: A system including a data plane including a first virtual machine designated as a primary node and a second virtual machine designated as a secondary node, and a lock service configured to control changes in designation of the primary node and the secondary node. The first virtual machine repeatedly issues requests to the second virtual machine or lock service extending designation as the primary node for a first duration. The request is repeatedly issued within a duration shorter than the first duration. The second virtual machine receives an indication of the designation of the first virtual machine as the primary node being extended, issues a request to the lock service to change the designation of the primary node after passage the first duration of time without further indication of first virtual machine being extended as primary node, and receives confirmation from the lock service of the change in designation.

    SYSTEM AND METHOD FOR PROVIDING TRANSACTION VERIFICATION

    公开(公告)号:US20180033004A1

    公开(公告)日:2018-02-01

    申请号:US15730444

    申请日:2017-10-11

    Applicant: GOOGLE LLC

    Inventor: Nayer Naguib

    CPC classification number: G06Q20/3825 G06Q20/401

    Abstract: A transaction verification process performed by a transaction network operator in communication with a client computing device and a third party provider. A computing device may be equipped with an integrity verification module for verifying the system integrity of the computing device, and a cryptographic module for digitally signing transaction requests. The transaction network operator may verify that transaction requests processed by the third party provider are properly associated with a valid computing device by verifying signatures from the cryptographic module and the integrity verification module. In response to a request from the third party provider, the transaction network operator may verify that the computing device is authorized to complete the transaction by challenging the computing device for proper credentials. The transaction network operator may verify the credentials provided by the client device and indicate to the third party provider that the transaction is valid.

Patent Agency Ranking