US20200396082A1 - Techniques to incentivize a blockchain network to prioritize state changes - Google Patents
Techniques to incentivize a blockchain network to prioritize state changes Download PDFInfo
- Publication number
- US20200396082A1 US20200396082A1 US17/005,057 US202017005057A US2020396082A1 US 20200396082 A1 US20200396082 A1 US 20200396082A1 US 202017005057 A US202017005057 A US 202017005057A US 2020396082 A1 US2020396082 A1 US 2020396082A1
- Authority
- US
- United States
- Prior art keywords
- transaction
- blockchain
- block
- network
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H04L2209/38—
Definitions
- the disclosed teachings generally relate to micro-services for blockchain technology. More particularly, the disclosed teachings relate to using techniques for increasing the probability that a transaction is included in a target block of a blockchain.
- a public blockchain is an open, distributed ledger that can record transactions between parties in a verifiable and permanent way.
- a blockchain is analogous to a distributed database on a distributed computing system that maintains a continuously growing list of ordered records called blocks.
- a block of a blockchain includes records of transaction(s) or other recorded data. Each block contains at least one timestamp, a block links to a previous block thus forming a chain of blocks.
- Blockchains are inherently resistant to modification of their recorded data. That is, once recorded, the data in a block cannot be altered retroactively. Through a peer-to-peer network and distributed timestamping, a blockchain is managed in a seemingly autonomous manner.
- Decentralized consensus can be achieved with a blockchain. This makes blockchains suitable for recording events, medical records, other records management activities, identity management, transaction processing, and proving data provenance.
- Well-known examples of decentralized systems that implement blockchains include Bitcoin and Ethereum cryptocurrencies. These types of systems provide a pragmatic solution for arriving at a consensus in the face of trust and timing problems typically encountered in distributed networks.
- the disclosed embodiments include techniques to increase the probability that network validators will include a transaction in a target block of a blockchain.
- the method includes creating and signing in real-time a transaction and loading copies of the transaction at agent nodes connected to a network of peer nodes.
- An agent node can obtain an indication of an opportunity to write the transaction to a target block.
- the method can further include broadcasting the transaction to the network of peer nodes based on the obtained indication of the opportunity to write the transaction, to improve a probability of having the transaction written to the target block.
- the disclosed embodiments also include a server computer that includes a processor and a memory including instructions that, when executed by the processor, cause the server computer to load copies of a transaction at agent node(s) connected to a network of peer nodes, obtain an indication of an opportunity to write the transaction to a target block, and propagate one or more copies of the transaction to the network of peer nodes based on the obtained indication of the opportunity to write the transaction.
- a server computer that includes a processor and a memory including instructions that, when executed by the processor, cause the server computer to load copies of a transaction at agent node(s) connected to a network of peer nodes, obtain an indication of an opportunity to write the transaction to a target block, and propagate one or more copies of the transaction to the network of peer nodes based on the obtained indication of the opportunity to write the transaction.
- the disclosed embodiments also include a method performed by a server computer of a network including peer nodes configured to maintain a blockchain.
- the method includes obtaining information associated with the network of peer nodes, and propagating copies of a transaction to the network of peer nodes based on the obtained information to increase the probability that the transaction will be recorded to a target block of a blockchain.
- FIG. 1 is a block diagram that illustrates a network of peer nodes that can implement a blockchain.
- FIG. 2 is a flow diagram that illustrates a method for implementing a blockchain on a network of peer.
- FIG. 3 is a block diagram that illustrates a system operable to increase the probability of having a transaction written to a target block of a blockchain.
- FIG. 4 is a flow diagram that illustrates a method for increasing the probability of recording a transaction to a target block of a blockchain.
- FIG. 5 is a block diagram that illustrates a computer operable to implement aspects of the disclosed technology.
- terms such as “processing,” “computing,” “calculating,” “determining,” “displaying,” “generating” or the like refer to actions and processes of a computer or similar electronic computing device that manipulates and transforms data represented as physical (electronic) quantities within the computer's memory or registers into other data similarly represented as physical quantities within the computer's memory, registers, or other such storage medium, transmission, or display devices.
- connection refers to any connection or coupling, either direct or indirect, between two or more elements.
- the coupling or connection between the elements can be physical, logical, or a combination thereof.
- a blockchain can implement a digital distributed leger.
- a digital distributed ledger has digital records of things such as transactions that are distributed and maintained among nodes of a computer network, where the entries are stored in blocks of the ledger that are cryptographically related somehow.
- a blockchain system has a decentralized, distributed database where a ledger is maintained at peer nodes. Hence, an intermediary is not required to maintain a blockchain.
- the transactions are typically authenticated with cryptographic hashing and mining techniques.
- FIG. 1 illustrates a network 100 of interconnected peer nodes 102 - 1 through 102 - 6 (also referred to collectively as peer nodes 102 and individually as peer node 102 ).
- the peer nodes 102 may be distributed across various geographic locations including regions all over the world.
- the disclosed embodiments may implement micro-services that influence the behavior of a blockchain implemented on the peer nodes 102 .
- the network 100 may include a combination of private, public, wired, or wireless portions. Data communicated over the network 100 may be encrypted or unencrypted at various locations or portions of the network 100 .
- Each peer node 102 may include combinations of hardware and/or software to process data, perform functions, communicate over the network 100 , and the like.
- the peer nodes 102 may include computing devices such as servers, desktop or laptop computers (e.g., APPLE MACBOOK, LENOVO 440), handheld mobile devices (e.g., APPLE IPHONE, SAMSUNG GALAXY, MICROSOFT SURFACE), and any other electronic computing device.
- Any component of the network 100 may include a processor, memory or storage, a network transceiver, a display, operating system and application software (e.g., for providing a user interface), and the like.
- Other components, hardware, and/or software included in the network 100 that are well known to persons skilled in the art are not shown or discussed herein for the sake of brevity.
- the network 100 can implement a blockchain that allows for the secure management of a shared ledger, where transactions are verified and stored on the network 100 without a governing central authority.
- Blockchains can be implemented in different configurations, ranging from public, open-source networks, to private blockchains that require explicit permission to read or write transactions.
- Central to a blockchain are cryptographic hash functions that secure the network 100 , in addition to enabling transactions, to protect a blockchain's integrity and anonymity.
- the network 100 may utilize cryptography to securely process transactions.
- public-key cryptography uses asymmetric key algorithms, where a key used by one party to perform either encryption or decryption is not the same as the key used by another in the counterpart operation.
- Each party has a pair of cryptographic keys: a public encryption key and a private decryption key.
- a key pair used for digital signatures consists of a private signing key and a public verification key.
- the public key may be widely distributed, while the private key is known only to its proprietor.
- the keys are related mathematically, but the parameters are chosen so that calculating the private key from the public key is unfeasible.
- the keys could be expressed in various formats, including hexadecimal format.
- FIG. 2 is a flowchart of processes 200 implemented by a blockchain on a network of peer nodes.
- a transaction is initiated when two parties exchange data (e.g., money, contracts, deeds, medical records, customer details, or any other asset that can be represented in digital form).
- data e.g., money, contracts, deeds, medical records, customer details, or any other asset that can be represented in digital form.
- step 204 the transaction is authenticated either instantaneously or placed in a queue of pending transactions.
- the network of peer nodes can determine if the transaction is valid based on rules of the blockchain protocol implemented on the network.
- a block of the blockchain is identified by a number (e.g., 256-bit hash number) created by using an algorithm of the blockchain protocol.
- Each block contains a header, a reference to a previous block's number, and data indicative of transactions.
- the sequence of linked hashes creates a secure chain of blocks.
- a block In step 208 , a block must be validated before being added to the blockchain.
- a form of validation is proof-of-work (POW) whereby the solution to a mathematical “puzzle” derived from a block's header is used for validation.
- POW proof-of-work
- the block can be added to the blockchain once verified by a selected peer node (also referred to as a miner or validator node).
- a blockchain protocol can implement a “mining” mechanism for verification purposes.
- an open source system could employ a POW mechanism (e.g., SHA-256 hash), where a solution to a mathematical problem is based on the data contained within the transaction and all previous blocks in the blockchain.
- the solution is computationally asymmetric in that it is generally computationally easy to verify but difficult to initially solve.
- a miner node can attempt to “solve” the block by making incremental changes to one variable until the solution satisfies a network-wide target.
- a POW cannot be falsified because mining operations are computationally expensive. For example, estimates of electricity used by global mining activity exceeds 1,000 MW.
- mining requires compute power (e.g., hardware), network connectivity, and electricity, which is the dominate cost.
- compute power e.g., hardware
- network connectivity e.g., network connectivity
- electricity which is the dominate cost.
- the incentive for a miner to expend this necessary amount of power is a reward (e.g., monetary and/or authorization to write a next block of the blockchain).
- a miner that solved the “puzzle” is rewarded and adds a block to the blockchain.
- the block is propagated to the network of peer nodes, and each node adds the block to the network's immutable and auditable blockchain.
- a malicious miner may try to submit an altered block to the chain that would change the number of a block and all subsequent blocks.
- the other peer nodes would detect the attempted change and reject the block from the blockchain, which prevents corruption of the blockchain.
- the process 200 is a non-limiting example of an implementation that could have an application for transferring virtual currency.
- Bitcoin is a digital currency that is cryptographically secured based on blockchain technology. It derives is value from scarcity and “trust” in the system. For example, the total number of Bitcoins is limited to 21 million in circulation. A Bitcoin is effectively infinitely divisible, and creation of a new bitcoin is adjusted such that a new block is added to the blockchain approximately every 10 minutes. Financial rewards for mining a new block of the Bitcoin blockchain started at 50 Bitcoins in 2009, and reduces as the number of Bitcoins in circulation increases. For example, a reward in 2017 is 12.5 Bitcoin, and is expected to be reduced again to 6.25 Bitcoin in 2021. At least 6 blocks must be mined before a transaction is typically considered secure and confirmed.
- Bitcoins are stored on a blockchain in the sense that the ledger tracks the quantity of Bitcoins associated with each address.
- Each public key address on the blockchain can be associated with a digital wallet, which represents the private key storage and associated public key.
- a wallet is associated with a private key that must be kept safe and known. Loss of a private key is an irrevocable loss of Bitcoins associated with that wallet.
- Digital signatures based on the private key aid to authenticate, guarantee integrity, and cannot be repudiated.
- Ethereum is an example of a cryptocurrency that also offers smart contract functionality.
- Smart contracts are computer protocols intended to facilitate, verify, or enforce performance of a contract.
- a smart contract can be accomplished via a combination of blockchain technology and self-execution or self-enforcement. Examples of smart contracts include credit default swaps, gambling or sports betting, prediction markets, welfare benefits, supply chain, insurance, etc.
- blockchain applications include chain of title or real property transfers; supply chain auditing or management; intellectual property protection; identification and health management; equity trading and financial services; records management and security, and basically anything that one would need or want to track.
- Another application of blockchain is in venture capital, including so called initial coin offerings (ICOs). Any of these transactions can be represented online in a block, where the block is broadcast to every peer node of the network. Once the network approves the transactions as valid, they are added to a block of the blockchain, which provides an indelible and transparent record of transactions.
- ICOs initial coin offerings
- the disclosed techniques include at least one method to increase the probability that a transaction is recorded to a target block of a blockchain.
- the methods can be used in whole or in part, in a distributed system or separately, to increase the probability that a specific transaction will be included in a target block of a blockchain.
- a blockchain can be implemented on a network (e.g., network 100 ) of geographically distributed peer nodes (e.g., peer nodes 102 ).
- the peer nodes run independent software programs that can create and/or propagate transactions over the network of peer nodes.
- a transaction is not finalized until it is included in a block by a validator, which can be a designation of a peer node that is selected randomly, pseudo-randomly, or that competes and wins the right to choose which transactions to write to the next block.
- Validators that create the next block are typically awarded a fee for creating the block, and have the right to collect transaction fees from the transactions that they include in the block. It is impossible to know what peer node will be the validator before the validator is chosen or wins.
- FIG. 3 is a block diagram that illustrates a system 300 operable to increase the probability of writing a transaction to a target block of a blockchain.
- the system 300 can perform processes for increasing the probability that a network validator of peer nodes will write a transaction in a target block of a blockchain.
- the illustrated system 300 is one of many possible configurations that can combine multiple transactions and geographic distribution methods to increase the probability of writing a transaction to a target block of a blockchain.
- the system 300 includes a network 302 of peer nodes 304 - 1 through 304 - 12 (also referred to collectively as peer nodes 304 and individually as peer node 304 ) that maintain a blockchain.
- the peer nodes 304 - 1 , 304 - 2 , and 304 - 3 each execute targeting software 306 - 1 , 306 - 2 , and 306 - 3 (also referred to collectively and individually as targeting software 306 ), respectively, that can exchange information with the peer nodes 304 that maintain the blockchain.
- agent nodes 308 - 1 , 308 - 2 , and 308 - 3 that execute the targeting software 306 - 1 , 306 - 2 , and 306 - 3 , respectively, are referred to as agent nodes 308 - 1 , 308 - 2 , and 308 - 3 (also referred to collectively as agent nodes 308 and individually as agent node 308 ), respectively.
- the agent nodes 308 are part of the network of peer nodes 304 that maintain the blockchain.
- the agent nodes 308 perform functions to increase the probability of writing a transaction to a block of the blockchain but do not themselves operate to maintain the blockchain. That is, the agent nodes can read data from the blockchain but may not be operable to write to a blockchain.
- the agent nodes 308 can load copies of pre-signed transactions 310 .
- the copies of the transactions 310 have can the same objective (e.g., to be written to a target block of a blockchain).
- the copies of the transactions 310 are received by the targeting software 306 , which can exchange information with other agent nodes and/or with the peer nodes 304 that maintain the blockchain.
- a targeting software e.g., targeting software 306 - 1 of an agent node (e.g., agent node 308 - 1 ) can receive a block number from a local peer node (e.g., peer node 304 - 1 ) and send a copy of a transaction to the local peer node, which can execute validation software to add the transaction to a specific numbered block (relative to the received block number).
- a targeting software e.g., targeting software 306 - 1
- agent node e.g., agent node 308 - 1
- a peer node that is geographically closer to an agent node that sent a transaction will be first to receive it compared to other peer nodes.
- a “geographically closer” peer node is physically closer to an agent node compared to other peer nodes. For example, peer nodes of geographic region #1 are closer to the agent node 308 - 1 compared to peer nodes of geographic regions #2 or #3.
- the probability that a validator node (i.e., peer node executing validation software) writes the transaction to a target block is increased by optimizing the propagation of the transaction across the network 302 . Specifically, a transaction received by a validator node before any other transactions are received will write that transaction to the target block. This can be achieved in part by having the agent node that is relatively closer to a validator node send its transaction first.
- instances of targeting software 306 run on machines (e.g., agent nodes 3068 ) that can be distributed geographically in an arbitrary manner. As shown, instances of the targeting software 306 are co-located in the same geographic region as possible transaction validators (e.g., peer nodes 304 ).
- the agent nodes 308 are elastic such that they can be started or stopped in regions based on changing network conditions (e.g., lag, increasing/decreasing number of validators).
- a geographically distributed instance of a targeting software can broadcast a transaction upon receiving notice that a target block will be reached by a peer node, to increase the probability that the transaction will be written to the target block by that validator node.
- the disclosed techniques involve gathering and analyzing information of the peer nodes, the blockchain protocol, historical information, transaction propagation, and behavior of the validation network to determine when and how to propagate transactions in a manner that increases the probability that a transaction will be written to a target block of the blockchain.
- the targeting software 306 can monitor and analyze the behavior of a public blockchain and its validators to determine the probability that the next block will happen at a point in time or time delay from previous blocks.
- the instances of the targeting software 306 that are deployed at different geographic regions can be interconnected to share statistics about their local peer nodes.
- each instance of a targeting software can analyze any combination of the number of transactions included in the last N blocks of a blockchain, the time between mined blocks received by a targeting software, the time delay between when a pending transaction is received and when it is written to a block, etc.
- each instance of the targeting software may analyze any combination of the characteristics of pending transactions that are included in a block by validator nodes; the threshold of transaction fees required for a transaction to be included in a block by validator nodes; the current validator rewards; changes in validator rewards over time; changes in validation difficulty in response to an increase/decrease in the number of active validators; characteristics of validated transactions or blocks that are not included in the blockchain; a propagation time for receipt of pending transactions, created blocks, changes in validation fees, changes in numbers of validators, and other network statistics; and test transactions sent to the network to test, monitor, and gather data about the above conditions. Based on an analysis of combinations of these factors, an agent node can broadcast a transaction to the network at a calculated time that increases the likelihood that the transaction will be included in a target block.
- the agent nodes 308 running the targeting software 306 can create and broadcast copies of transactions meant to produce the same outcome of writing the transactions to a target block.
- the transactions are pre-signed, or created and signed in real-time.
- the transactions are sent out sequentially (and/or periodically) before the expected target block to increase the odds that a transaction will be included in the target block, to achieve the desirable result.
- the financial incentives for including a transaction in a block of a blockchain can be dynamically altered.
- competition for a given trade opportunity is typically restricted by a time dimension.
- Market participants generally pay fixed transaction fees, and competition centers around the speed of order executions and who can get to the opportunity first.
- this competition is likely to happen on both time and price dimensions.
- due to the mechanics of blockchains market participants have an equal amount of time to access a given opportunity.
- the market participants will be more likely to compete on a price dimension, in what can be referred to as a “block priority auction.” Given a specific trade opportunity, market participants can compete with each other to pay transaction validators to assign the transaction to themselves.
- decentralized exchange “A” there can be a buy order for token “ABC” at $25 per token.
- decentralized exchange “B” there can be a sell order for token “ABC” at $10 per token.
- the market is “crossed” and there is an arbitrage opportunity to make $15 per token by instantaneously buying token “ABC” on exchange CB′ and selling it on exchange “A.”
- the first participant to successfully buy token “ABC” on exchange “B” will realize the arbitrage opportunity.
- Multiple participants will compete to have their transactions included in the next block to record their purchase of token “ABC.”
- the validator who mines this block will have to choose which market participant's transaction to include, and will rationally include the transaction which pays the validator the highest fee. Those market participants that can make the most of this opportunity will be able to pay the greatest amount to transaction validators, and the transaction will be assigned to them.
- the disclosed techniques can change the fee associated with a transaction or subsequent transactions by estimating the computational resources that a transaction will use; analyze the fees collected by validators; analyze the fees included in other transactions; and set the optimal fee that positions a transaction as the most rewarding to validators based on the above analysis.
- an agent node running an instance of a validation software can prioritize a transaction loaded onto the agent node.
- the value of getting a transaction included in a target block exceeds the cost of becoming a validator for the target block and, as such, will prioritize writing a transaction to a target block over becoming the validator node for a target block.
- the validation software is aware of its own transactions and can both broadcast its transactions to peer nodes and attempt to validate a block containing its own transaction.
- the details of transactions loaded to agent nodes are shaped based on an analysis of mining pools of a network of peer nodes.
- a mining pool is a group of validator nodes that have pooled their resources to increase the probability of mining a next block.
- Mining pools might have specific conditions by which they will include a transaction in a block. Examples of these conditions include transaction fee minimums, specific policies on mining blocks with and without transactions, network propagation speed requirements, and blockchain state change requirements.
- transaction details can be shaped to increase the probability that the specific mining pool will include a transaction in a target block.
- FIG. 4 is a flow diagram that illustrates a method 400 for increasing the probability of having a transaction written to a target block of a blockchain.
- the blockchain may be a decentralized public blockchain and/or can implement an asset exchange such that transactions indicate a purchase or sale of an asset.
- the method 400 can be performed by one or more server computers.
- a server computer e.g., agent node
- copies of one or more transactions are loaded at agent nodes connected to a network of peer nodes.
- the agent nodes are peer nodes that participate to maintain the blockchain.
- the network latency of the network of peer nodes is greater than a network latency of the agent nodes such that the agent nodes can exchange information with peer nodes more rapidly than information can be propagated throughout the network of peer nodes.
- the agent nodes may be globally distributed such that each agent node is located at a different geographic region that includes a distinct subset of peer nodes.
- the agent nodes may form, or be part of, a backend network that can obtain information about the network of peer nodes, load copies of pre-signed transactions or load copies of transactions created and signed in real-time, propagate the copies to the peer nodes, and exchange information about the peer nodes among the agent nodes.
- the transaction is a purchase of a limited supply of assets of an initial offering (e.g., an initial coin offering (ICO)).
- the transaction is one of a temporally ordered set of transactions available for writing to a target block.
- agent node(s) can obtain an indication of an opportunity to write a transaction to a target block.
- the target block may be associated with a point in time at which the transaction is to be written to the blockchain.
- the target block may be a next block of the blockchain, or a block other than the next block.
- the indication may be sent to the agent node by one or more of a subset of peer nodes. For example, the indication may be of another block relative to the target block. In another example, the obtained indication is of a previous block on which a transaction was written.
- Agent node(s) can determine values for parameters that increase the probability of having a transaction written to a target block of a blockchain. For example, in step 406 , a target fee amount can be set for a transaction to a value greater than any other fee for any other transaction that could be written to the target block.
- the fee can be determined by, for example, estimating computational resources that a transaction will use, analyzing fees collected by validators, and analyzing fees associated with other transactions.
- agent node(s) can share obtained information of the peer nodes to coordinate behavior that increases the probability of including a transaction in a target block. For example, agent node(s) can determine when to broadcast copies of transactions based on a determination of a threshold amount of fees required for a transaction to be written to the target block by a validator node (e.g., analyzing current validator rewards, changes in validator rewards, and/or changes in validation difficulty responsive to an increase/decrease in a quantity of active validators).
- a validator node e.g., analyzing current validator rewards, changes in validator rewards, and/or changes in validation difficulty responsive to an increase/decrease in a quantity of active validators.
- agent node(s) can calculate when to broadcast copies of a transaction based on an analysis of, for example, a quantity of transactions written in prior blocks of the blockchain, a time delay between when a transaction is received and written to a block of the blockchain, a characteristic of a pending transaction or transaction written to a block of the blockchain, or a characteristic of a block that was not included in the blockchain.
- agent node(s) can monitor the network of peer nodes to determine a probability that a target block will be created at a pre-selected point in time or at a pre-selected point in time relative to a previous block. For example, each agent node can independently monitor one or more local peer nodes and propagate transaction(s) to the monitored peer nodes. Moreover, an agent node can attempt to cause a peer node to be selected as a validator node for writing a transaction to the target block.
- the propagation of transactions depends on a group of peer nodes with pooled resources that increase a probability that the group will write a next block of the blockchain.
- agent node(s) can calculate a point in time to broadcast the transaction based on an analysis of the peer nodes with pooled resources, which increase a probability that the group will write a next block of the blockchain.
- agent node(s) can propagate copies of a transaction to peer nodes based on an obtained indication and/or determined optimization parameters that improve a probability of having the transaction written to the target block.
- the copies may be propagated responsive to obtaining the indication.
- the copies are propagated to a subset of peer nodes that includes a peer node selected as a validator node to write a transaction to the target block.
- the peer node selected as a validator node can select which of many transactions is written to the target block.
- a validator node may be randomly or pseudo-randomly selected, or selected as the winner of an auction for an opportunity to write a next block of the blockchain.
- the copies are broadcast by an agent node to any peer nodes in a geographic region that includes the agent node. In some embodiments, the copies are broadcast sequentially (and/or periodically) beginning prior to an estimated point in time when creation of the target block is expected. In some embodiments, where there are multiple copies of multiple different transactions, the agent nodes can prioritize certain transactions among the different transactions to propagate across the network of peer nodes.
- the method 400 is a non-limiting example of processes for increasing a probability of having a transaction written to a target block.
- a person skilled in the art would understand that other embodiments within the scope of the disclosure may perform the steps of the method 400 in another order, omit steps, and/or include additional steps that are well known to persons skilled in the art.
- FIG. 5 is a block diagram of a computing device 500 of system 300 operable to implement the disclosed technology.
- the computing device 500 e.g., agent node 308 , peer node 304
- the computing device 500 may be a generic computer or specifically designed to carry out features of system 300 .
- the computing device 500 may be a system-on-chip (SOC), a single-board computer (SBC) system, a desktop or laptop computer, a kiosk, a mainframe, a mesh of computer systems, a handheld mobile device, or combinations thereof.
- SOC system-on-chip
- SBC single-board computer
- the computing device 500 may be a standalone device or part of a distributed system that spans multiple networks, locations, machines, or combinations thereof.
- the computing device 500 operates as a server computer or a client device in a client-server network environment, or as a peer machine in a peer-to-peer system.
- the computing device 500 may perform one or more steps of the disclosed embodiments in real time, in near real time, offline, by batch processing, or combinations thereof.
- the computing device 500 includes a bus 502 operable to transfer data between hardware components. These components include a control 504 (i.e., processing system), a network interface 506 , an Input/Output (I/O) system 508 , and a clock system 510 .
- the computing device 500 may include other components not shown or further discussed for the sake of brevity. One having ordinary skill in the art will understand any hardware and software included but not shown in FIG. 5 .
- the control 504 includes one or more processors 512 (e.g., central processing units (CPUs), application specific integrated circuits (ASICs), and/or field programmable gate arrays (FPGAs)) and memory 514 (which may include software 516 ).
- the memory 514 may include, for example, volatile memory such as random-access memory (RAM) and/or non-volatile memory such as read-only memory (ROM).
- RAM random-access memory
- ROM read-only memory
- the memory 514 can be local, remote, or distributed.
- a software program when referred to as “implemented in a computer-readable storage medium,” includes computer-readable instructions stored in a memory (e.g., memory 514 ).
- a processor e.g., processor 512
- a processor is “configured to execute a software program” when at least one value associated with the software program is stored in a register that is readable by the processor.
- routines executed to implement the disclosed embodiments may be implemented as part of operating system (OS) software (e.g., MICROSOFT WINDOWS, LINUX) or a specific software application, component, program, object, module or sequence of instructions referred to as “computer programs.”
- OS operating system
- computer programs e.g., MICROSOFT WINDOWS, LINUX
- the computer programs typically comprise one or more instructions set at various times in various memory devices of a computer (e.g., computing device 500 ) and which, when read and executed by at least one processor (e.g., processor 512 ), cause the computer to perform operations to execute features involving the various aspects of the disclosed embodiments.
- a carrier containing the aforementioned computer program product is provided.
- the carrier is one of an electronic signal, an optical signal, a radio signal, or a non-transitory computer-readable storage medium (e.g., the memory 514 ).
- the network interface 506 may include a modem or other interfaces (not shown) for coupling the computing device 500 to other computers over the network 518 (e.g., network 100 , network 302 ).
- the I/O system 508 may operate to control various I/O devices, including peripheral devices such as a display system 520 (e.g., a monitor or touch-sensitive display) and one or more input devices 522 (e.g., a keyboard and/or pointing device).
- Other I/O devices 524 may include, for example, a disk drive, printer, scanner, or the like.
- the clock system 30 controls a timer for use by the disclosed embodiments.
- Operation of a memory device may comprise a visually perceptible physical transformation.
- the transformation may comprise a physical transformation of an article to a different state or thing.
- a change in state may involve accumulation and storage of charge or release of stored charge.
- a change of state may comprise a physical change or transformation in magnetic orientation, or a physical change or transformation in molecular structure, such as from crystalline to amorphous or vice versa.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Disclosed embodiments include techniques to increase the probability that network validators will include a specific transaction in a target block of a blockchain. The method includes creating and signing in real-time a transaction and loading copies of the transaction at agent nodes connected to a network of peer nodes. An agent node can obtain an indication of an opportunity to write the transaction to a target block. The method can further include broadcasting the transaction to the network of peer nodes based on the obtained indication of the opportunity to write the transaction, to improve a probability of having the transaction written to the target block.
Description
- This application is a continuation of U.S. patent application Ser. No. 15/947,511 titled “Techniques for Increasing the Probability that a Transaction will be Included in a Target Block of a Blockchain” and filed on Apr. 6, 2018, which claims the benefit of U.S. Provisional Patent Application No. 62/483,285 titled “Micro-Services to Increase the Probability that a Transaction is Included in a Block of a Blockchain” and filed on Apr. 7, 2017, both applications are incorporated by reference herein in their entirety.
- The disclosed teachings generally relate to micro-services for blockchain technology. More particularly, the disclosed teachings relate to using techniques for increasing the probability that a transaction is included in a target block of a blockchain.
- A public blockchain is an open, distributed ledger that can record transactions between parties in a verifiable and permanent way. A blockchain is analogous to a distributed database on a distributed computing system that maintains a continuously growing list of ordered records called blocks. A block of a blockchain includes records of transaction(s) or other recorded data. Each block contains at least one timestamp, a block links to a previous block thus forming a chain of blocks. Blockchains are inherently resistant to modification of their recorded data. That is, once recorded, the data in a block cannot be altered retroactively. Through a peer-to-peer network and distributed timestamping, a blockchain is managed in a seemingly autonomous manner.
- Decentralized consensus can be achieved with a blockchain. This makes blockchains suitable for recording events, medical records, other records management activities, identity management, transaction processing, and proving data provenance. Well-known examples of decentralized systems that implement blockchains include Bitcoin and Ethereum cryptocurrencies. These types of systems provide a pragmatic solution for arriving at a consensus in the face of trust and timing problems typically encountered in distributed networks.
- The disclosed embodiments include techniques to increase the probability that network validators will include a transaction in a target block of a blockchain. The method includes creating and signing in real-time a transaction and loading copies of the transaction at agent nodes connected to a network of peer nodes. An agent node can obtain an indication of an opportunity to write the transaction to a target block. The method can further include broadcasting the transaction to the network of peer nodes based on the obtained indication of the opportunity to write the transaction, to improve a probability of having the transaction written to the target block.
- The disclosed embodiments also include a server computer that includes a processor and a memory including instructions that, when executed by the processor, cause the server computer to load copies of a transaction at agent node(s) connected to a network of peer nodes, obtain an indication of an opportunity to write the transaction to a target block, and propagate one or more copies of the transaction to the network of peer nodes based on the obtained indication of the opportunity to write the transaction.
- The disclosed embodiments also include a method performed by a server computer of a network including peer nodes configured to maintain a blockchain. The method includes obtaining information associated with the network of peer nodes, and propagating copies of a transaction to the network of peer nodes based on the obtained information to increase the probability that the transaction will be recorded to a target block of a blockchain.
- This Summary is provided to introduce a selection of concepts in a simplified form that is further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. Other aspects of the disclosed embodiments will be apparent from the accompanying Figures and Detailed Description.
- One or more embodiments of the present invention are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements.
-
FIG. 1 is a block diagram that illustrates a network of peer nodes that can implement a blockchain. -
FIG. 2 is a flow diagram that illustrates a method for implementing a blockchain on a network of peer. -
FIG. 3 is a block diagram that illustrates a system operable to increase the probability of having a transaction written to a target block of a blockchain. -
FIG. 4 is a flow diagram that illustrates a method for increasing the probability of recording a transaction to a target block of a blockchain. -
FIG. 5 is a block diagram that illustrates a computer operable to implement aspects of the disclosed technology. - The embodiments set forth below represent the necessary information to enable those skilled in the art to practice the embodiments, and illustrate the best mode of practicing the embodiments. Upon reading the following description in light of the accompanying figures, those skilled in the art will understand the concepts of the disclosure and will recognize applications of these concepts that are not particularly addressed herein. It should be understood that these concepts and applications fall within the scope of the disclosure and the accompanying claims.
- The purpose of terminology used herein is only for describing embodiments and is not intended to limit the scope of the disclosure. Where context permits, words using the singular or plural form may also include the plural or singular form, respectively.
- As used herein, unless specifically stated otherwise, terms such as “processing,” “computing,” “calculating,” “determining,” “displaying,” “generating” or the like, refer to actions and processes of a computer or similar electronic computing device that manipulates and transforms data represented as physical (electronic) quantities within the computer's memory or registers into other data similarly represented as physical quantities within the computer's memory, registers, or other such storage medium, transmission, or display devices.
- As used herein, the terms “connected,” “coupled,” or variants thereof, refer to any connection or coupling, either direct or indirect, between two or more elements. The coupling or connection between the elements can be physical, logical, or a combination thereof.
- A blockchain can implement a digital distributed leger. In layman's terms, a digital distributed ledger has digital records of things such as transactions that are distributed and maintained among nodes of a computer network, where the entries are stored in blocks of the ledger that are cryptographically related somehow. Specifically, a blockchain system has a decentralized, distributed database where a ledger is maintained at peer nodes. Hence, an intermediary is not required to maintain a blockchain. The transactions are typically authenticated with cryptographic hashing and mining techniques.
-
FIG. 1 illustrates anetwork 100 of interconnected peer nodes 102-1 through 102-6 (also referred to collectively as peer nodes 102 and individually as peer node 102). The peer nodes 102 may be distributed across various geographic locations including regions all over the world. The disclosed embodiments may implement micro-services that influence the behavior of a blockchain implemented on the peer nodes 102. Thenetwork 100 may include a combination of private, public, wired, or wireless portions. Data communicated over thenetwork 100 may be encrypted or unencrypted at various locations or portions of thenetwork 100. Each peer node 102 may include combinations of hardware and/or software to process data, perform functions, communicate over thenetwork 100, and the like. - The peer nodes 102 may include computing devices such as servers, desktop or laptop computers (e.g., APPLE MACBOOK, LENOVO 440), handheld mobile devices (e.g., APPLE IPHONE, SAMSUNG GALAXY, MICROSOFT SURFACE), and any other electronic computing device. Any component of the
network 100 may include a processor, memory or storage, a network transceiver, a display, operating system and application software (e.g., for providing a user interface), and the like. Other components, hardware, and/or software included in thenetwork 100 that are well known to persons skilled in the art are not shown or discussed herein for the sake of brevity. - The
network 100 can implement a blockchain that allows for the secure management of a shared ledger, where transactions are verified and stored on thenetwork 100 without a governing central authority. Blockchains can be implemented in different configurations, ranging from public, open-source networks, to private blockchains that require explicit permission to read or write transactions. Central to a blockchain are cryptographic hash functions that secure thenetwork 100, in addition to enabling transactions, to protect a blockchain's integrity and anonymity. - The
network 100 may utilize cryptography to securely process transactions. For example, public-key cryptography uses asymmetric key algorithms, where a key used by one party to perform either encryption or decryption is not the same as the key used by another in the counterpart operation. Each party has a pair of cryptographic keys: a public encryption key and a private decryption key. For example, a key pair used for digital signatures consists of a private signing key and a public verification key. The public key may be widely distributed, while the private key is known only to its proprietor. The keys are related mathematically, but the parameters are chosen so that calculating the private key from the public key is unfeasible. Moreover, the keys could be expressed in various formats, including hexadecimal format. -
FIG. 2 is a flowchart ofprocesses 200 implemented by a blockchain on a network of peer nodes. Instep 202, a transaction is initiated when two parties exchange data (e.g., money, contracts, deeds, medical records, customer details, or any other asset that can be represented in digital form). It should be understood that the steps of theprocesses 200 can be practiced in different orders and/or omit some steps and/or add other steps that would be well known to persons skilled in the art. - In
step 204, the transaction is authenticated either instantaneously or placed in a queue of pending transactions. The network of peer nodes can determine if the transaction is valid based on rules of the blockchain protocol implemented on the network. - In
step 206, a block of the blockchain is identified by a number (e.g., 256-bit hash number) created by using an algorithm of the blockchain protocol. Each block contains a header, a reference to a previous block's number, and data indicative of transactions. The sequence of linked hashes creates a secure chain of blocks. - In
step 208, a block must be validated before being added to the blockchain. In open-source blockchains, a form of validation is proof-of-work (POW) whereby the solution to a mathematical “puzzle” derived from a block's header is used for validation. The block can be added to the blockchain once verified by a selected peer node (also referred to as a miner or validator node). - Specifically, a blockchain protocol can implement a “mining” mechanism for verification purposes. For example, an open source system could employ a POW mechanism (e.g., SHA-256 hash), where a solution to a mathematical problem is based on the data contained within the transaction and all previous blocks in the blockchain. The solution is computationally asymmetric in that it is generally computationally easy to verify but difficult to initially solve. In some instances, a miner node can attempt to “solve” the block by making incremental changes to one variable until the solution satisfies a network-wide target. A POW cannot be falsified because mining operations are computationally expensive. For example, estimates of electricity used by global mining activity exceeds 1,000 MW. Accordingly, mining requires compute power (e.g., hardware), network connectivity, and electricity, which is the dominate cost. The incentive for a miner to expend this necessary amount of power is a reward (e.g., monetary and/or authorization to write a next block of the blockchain).
- In
step 210, a miner that solved the “puzzle” is rewarded and adds a block to the blockchain. The block is propagated to the network of peer nodes, and each node adds the block to the network's immutable and auditable blockchain. A malicious miner may try to submit an altered block to the chain that would change the number of a block and all subsequent blocks. However, the other peer nodes would detect the attempted change and reject the block from the blockchain, which prevents corruption of the blockchain. - The
process 200 is a non-limiting example of an implementation that could have an application for transferring virtual currency. For example, Bitcoin is a digital currency that is cryptographically secured based on blockchain technology. It derives is value from scarcity and “trust” in the system. For example, the total number of Bitcoins is limited to 21 million in circulation. A Bitcoin is effectively infinitely divisible, and creation of a new bitcoin is adjusted such that a new block is added to the blockchain approximately every 10 minutes. Financial rewards for mining a new block of the Bitcoin blockchain started at 50 Bitcoins in 2009, and reduces as the number of Bitcoins in circulation increases. For example, a reward in 2017 is 12.5 Bitcoin, and is expected to be reduced again to 6.25 Bitcoin in 2021. At least 6 blocks must be mined before a transaction is typically considered secure and confirmed. - Bitcoins are stored on a blockchain in the sense that the ledger tracks the quantity of Bitcoins associated with each address. Each public key address on the blockchain can be associated with a digital wallet, which represents the private key storage and associated public key. Thus, a wallet is associated with a private key that must be kept safe and known. Loss of a private key is an irrevocable loss of Bitcoins associated with that wallet. Digital signatures based on the private key aid to authenticate, guarantee integrity, and cannot be repudiated.
- Ethereum is an example of a cryptocurrency that also offers smart contract functionality. Smart contracts are computer protocols intended to facilitate, verify, or enforce performance of a contract. A smart contract can be accomplished via a combination of blockchain technology and self-execution or self-enforcement. Examples of smart contracts include credit default swaps, gambling or sports betting, prediction markets, welfare benefits, supply chain, insurance, etc.
- Other examples of blockchain applications include chain of title or real property transfers; supply chain auditing or management; intellectual property protection; identification and health management; equity trading and financial services; records management and security, and basically anything that one would need or want to track. Another application of blockchain is in venture capital, including so called initial coin offerings (ICOs). Any of these transactions can be represented online in a block, where the block is broadcast to every peer node of the network. Once the network approves the transactions as valid, they are added to a block of the blockchain, which provides an indelible and transparent record of transactions.
- The disclosed techniques include at least one method to increase the probability that a transaction is recorded to a target block of a blockchain. The methods can be used in whole or in part, in a distributed system or separately, to increase the probability that a specific transaction will be included in a target block of a blockchain. A blockchain can be implemented on a network (e.g., network 100) of geographically distributed peer nodes (e.g., peer nodes 102). The peer nodes run independent software programs that can create and/or propagate transactions over the network of peer nodes.
- It takes time to propagate information on any network and, likewise, propagating transactions of a blockchain across a global network takes time. A transaction is not finalized until it is included in a block by a validator, which can be a designation of a peer node that is selected randomly, pseudo-randomly, or that competes and wins the right to choose which transactions to write to the next block. Validators that create the next block are typically awarded a fee for creating the block, and have the right to collect transaction fees from the transactions that they include in the block. It is impossible to know what peer node will be the validator before the validator is chosen or wins.
-
FIG. 3 is a block diagram that illustrates asystem 300 operable to increase the probability of writing a transaction to a target block of a blockchain. Specifically, thesystem 300 can perform processes for increasing the probability that a network validator of peer nodes will write a transaction in a target block of a blockchain. The illustratedsystem 300 is one of many possible configurations that can combine multiple transactions and geographic distribution methods to increase the probability of writing a transaction to a target block of a blockchain. - The
system 300 includes anetwork 302 of peer nodes 304-1 through 304-12 (also referred to collectively as peer nodes 304 and individually as peer node 304) that maintain a blockchain. As shown, the peer nodes 304-1, 304-2, and 304-3 each execute targeting software 306-1, 306-2, and 306-3 (also referred to collectively and individually as targeting software 306), respectively, that can exchange information with the peer nodes 304 that maintain the blockchain. The local peer nodes 304-1, 304-2, and 304-3 that execute the targeting software 306-1, 306-2, and 306-3, respectively, are referred to as agent nodes 308-1, 308-2, and 308-3 (also referred to collectively as agent nodes 308 and individually as agent node 308), respectively. As shown, the agent nodes 308 are part of the network of peer nodes 304 that maintain the blockchain. However, in some embodiments, the agent nodes 308 perform functions to increase the probability of writing a transaction to a block of the blockchain but do not themselves operate to maintain the blockchain. That is, the agent nodes can read data from the blockchain but may not be operable to write to a blockchain. - The agent nodes 308 can load copies of
pre-signed transactions 310. The copies of thetransactions 310 have can the same objective (e.g., to be written to a target block of a blockchain). The copies of thetransactions 310 are received by the targeting software 306, which can exchange information with other agent nodes and/or with the peer nodes 304 that maintain the blockchain. For example, a targeting software (e.g., targeting software 306-1) of an agent node (e.g., agent node 308-1) can receive a block number from a local peer node (e.g., peer node 304-1) and send a copy of a transaction to the local peer node, which can execute validation software to add the transaction to a specific numbered block (relative to the received block number). - A peer node that is geographically closer to an agent node that sent a transaction will be first to receive it compared to other peer nodes. A “geographically closer” peer node is physically closer to an agent node compared to other peer nodes. For example, peer nodes of
geographic region # 1 are closer to the agent node 308-1 compared to peer nodes ofgeographic regions # 2 or #3. The probability that a validator node (i.e., peer node executing validation software) writes the transaction to a target block is increased by optimizing the propagation of the transaction across thenetwork 302. Specifically, a transaction received by a validator node before any other transactions are received will write that transaction to the target block. This can be achieved in part by having the agent node that is relatively closer to a validator node send its transaction first. - Specifically, instances of targeting software 306 run on machines (e.g., agent nodes 3068) that can be distributed geographically in an arbitrary manner. As shown, instances of the targeting software 306 are co-located in the same geographic region as possible transaction validators (e.g., peer nodes 304). The agent nodes 308 are elastic such that they can be started or stopped in regions based on changing network conditions (e.g., lag, increasing/decreasing number of validators). A geographically distributed instance of a targeting software can broadcast a transaction upon receiving notice that a target block will be reached by a peer node, to increase the probability that the transaction will be written to the target block by that validator node.
- In some embodiments, the disclosed techniques involve gathering and analyzing information of the peer nodes, the blockchain protocol, historical information, transaction propagation, and behavior of the validation network to determine when and how to propagate transactions in a manner that increases the probability that a transaction will be written to a target block of the blockchain. For example, the targeting software 306 can monitor and analyze the behavior of a public blockchain and its validators to determine the probability that the next block will happen at a point in time or time delay from previous blocks. Moreover, the instances of the targeting software 306 that are deployed at different geographic regions can be interconnected to share statistics about their local peer nodes.
- For example, each instance of a targeting software can analyze any combination of the number of transactions included in the last N blocks of a blockchain, the time between mined blocks received by a targeting software, the time delay between when a pending transaction is received and when it is written to a block, etc. In some embodiments, each instance of the targeting software may analyze any combination of the characteristics of pending transactions that are included in a block by validator nodes; the threshold of transaction fees required for a transaction to be included in a block by validator nodes; the current validator rewards; changes in validator rewards over time; changes in validation difficulty in response to an increase/decrease in the number of active validators; characteristics of validated transactions or blocks that are not included in the blockchain; a propagation time for receipt of pending transactions, created blocks, changes in validation fees, changes in numbers of validators, and other network statistics; and test transactions sent to the network to test, monitor, and gather data about the above conditions. Based on an analysis of combinations of these factors, an agent node can broadcast a transaction to the network at a calculated time that increases the likelihood that the transaction will be included in a target block.
- The agent nodes 308 running the targeting software 306 can create and broadcast copies of transactions meant to produce the same outcome of writing the transactions to a target block. In some embodiments, the transactions are pre-signed, or created and signed in real-time. In some embodiments, the transactions are sent out sequentially (and/or periodically) before the expected target block to increase the odds that a transaction will be included in the target block, to achieve the desirable result.
- In some embodiments, the financial incentives for including a transaction in a block of a blockchain can be dynamically altered. For example, in traditional electronic marketplaces, competition for a given trade opportunity is typically restricted by a time dimension. Market participants generally pay fixed transaction fees, and competition centers around the speed of order executions and who can get to the opportunity first. On a blockchain, this competition is likely to happen on both time and price dimensions. In particular, due to the mechanics of blockchains, market participants have an equal amount of time to access a given opportunity. The market participants will be more likely to compete on a price dimension, in what can be referred to as a “block priority auction.” Given a specific trade opportunity, market participants can compete with each other to pay transaction validators to assign the transaction to themselves.
- For example, on decentralized exchange “A,” there can be a buy order for token “ABC” at $25 per token. On decentralized exchange “B,” there can be a sell order for token “ABC” at $10 per token. The market is “crossed” and there is an arbitrage opportunity to make $15 per token by instantaneously buying token “ABC” on exchange CB′ and selling it on exchange “A.” The first participant to successfully buy token “ABC” on exchange “B” will realize the arbitrage opportunity. Multiple participants will compete to have their transactions included in the next block to record their purchase of token “ABC.” The validator who mines this block will have to choose which market participant's transaction to include, and will rationally include the transaction which pays the validator the highest fee. Those market participants that can make the most of this opportunity will be able to pay the greatest amount to transaction validators, and the transaction will be assigned to them.
- The disclosed techniques can change the fee associated with a transaction or subsequent transactions by estimating the computational resources that a transaction will use; analyze the fees collected by validators; analyze the fees included in other transactions; and set the optimal fee that positions a transaction as the most rewarding to validators based on the above analysis.
- In some embodiments, an agent node running an instance of a validation software can prioritize a transaction loaded onto the agent node. In particular, it is possible that the value of getting a transaction included in a target block exceeds the cost of becoming a validator for the target block and, as such, will prioritize writing a transaction to a target block over becoming the validator node for a target block. Additionally, if already acting as validator node, there is a small probability of validating a target block as a free benefit. The validation software is aware of its own transactions and can both broadcast its transactions to peer nodes and attempt to validate a block containing its own transaction.
- In some embodiments, the details of transactions loaded to agent nodes are shaped based on an analysis of mining pools of a network of peer nodes. A mining pool is a group of validator nodes that have pooled their resources to increase the probability of mining a next block. Mining pools might have specific conditions by which they will include a transaction in a block. Examples of these conditions include transaction fee minimums, specific policies on mining blocks with and without transactions, network propagation speed requirements, and blockchain state change requirements. By analyzing characteristics of a specific mining pool, transaction details can be shaped to increase the probability that the specific mining pool will include a transaction in a target block.
-
FIG. 4 is a flow diagram that illustrates amethod 400 for increasing the probability of having a transaction written to a target block of a blockchain. The blockchain may be a decentralized public blockchain and/or can implement an asset exchange such that transactions indicate a purchase or sale of an asset. In some embodiments, themethod 400 can be performed by one or more server computers. A server computer (e.g., agent node) may have a processor and memory including instructions that, when executed by the processor, cause the agent node to perform themethod 400. - In
step 402, copies of one or more transactions are loaded at agent nodes connected to a network of peer nodes. In some embodiments, the agent nodes are peer nodes that participate to maintain the blockchain. In some embodiments, the network latency of the network of peer nodes is greater than a network latency of the agent nodes such that the agent nodes can exchange information with peer nodes more rapidly than information can be propagated throughout the network of peer nodes. - The agent nodes may be globally distributed such that each agent node is located at a different geographic region that includes a distinct subset of peer nodes. In some embodiments, the agent nodes may form, or be part of, a backend network that can obtain information about the network of peer nodes, load copies of pre-signed transactions or load copies of transactions created and signed in real-time, propagate the copies to the peer nodes, and exchange information about the peer nodes among the agent nodes. In some embodiments, the transaction is a purchase of a limited supply of assets of an initial offering (e.g., an initial coin offering (ICO)). In some embodiments, the transaction is one of a temporally ordered set of transactions available for writing to a target block.
- In
step 404, agent node(s) can obtain an indication of an opportunity to write a transaction to a target block. The target block may be associated with a point in time at which the transaction is to be written to the blockchain. The target block may be a next block of the blockchain, or a block other than the next block. The indication may be sent to the agent node by one or more of a subset of peer nodes. For example, the indication may be of another block relative to the target block. In another example, the obtained indication is of a previous block on which a transaction was written. - Agent node(s) can determine values for parameters that increase the probability of having a transaction written to a target block of a blockchain. For example, in
step 406, a target fee amount can be set for a transaction to a value greater than any other fee for any other transaction that could be written to the target block. The fee can be determined by, for example, estimating computational resources that a transaction will use, analyzing fees collected by validators, and analyzing fees associated with other transactions. - In some embodiments, agent node(s) can share obtained information of the peer nodes to coordinate behavior that increases the probability of including a transaction in a target block. For example, agent node(s) can determine when to broadcast copies of transactions based on a determination of a threshold amount of fees required for a transaction to be written to the target block by a validator node (e.g., analyzing current validator rewards, changes in validator rewards, and/or changes in validation difficulty responsive to an increase/decrease in a quantity of active validators).
- In some embodiments, agent node(s) can calculate when to broadcast copies of a transaction based on an analysis of, for example, a quantity of transactions written in prior blocks of the blockchain, a time delay between when a transaction is received and written to a block of the blockchain, a characteristic of a pending transaction or transaction written to a block of the blockchain, or a characteristic of a block that was not included in the blockchain.
- Other examples used to calculate a optimal broadcast time include time(s) for each agent node to receive information indicative of a transaction, creation of a block, changes in validation fees, changes of a quantity of validators, or a statistic of the network of peer nodes. Yet another example includes a test transaction sent to a network of peer nodes to test, monitor, and gather data about conditions of the network of peer nodes. The results of the test could be used to determine an optimal way to propagate transactions.
- In some embodiments, agent node(s) can monitor the network of peer nodes to determine a probability that a target block will be created at a pre-selected point in time or at a pre-selected point in time relative to a previous block. For example, each agent node can independently monitor one or more local peer nodes and propagate transaction(s) to the monitored peer nodes. Moreover, an agent node can attempt to cause a peer node to be selected as a validator node for writing a transaction to the target block.
- In some embodiments, the propagation of transactions depends on a group of peer nodes with pooled resources that increase a probability that the group will write a next block of the blockchain. For example, agent node(s) can calculate a point in time to broadcast the transaction based on an analysis of the peer nodes with pooled resources, which increase a probability that the group will write a next block of the blockchain.
- In
step 408, agent node(s) can propagate copies of a transaction to peer nodes based on an obtained indication and/or determined optimization parameters that improve a probability of having the transaction written to the target block. In some embodiments, the copies may be propagated responsive to obtaining the indication. In some embodiments, the copies are propagated to a subset of peer nodes that includes a peer node selected as a validator node to write a transaction to the target block. The peer node selected as a validator node can select which of many transactions is written to the target block. A validator node may be randomly or pseudo-randomly selected, or selected as the winner of an auction for an opportunity to write a next block of the blockchain. - In some embodiments, the copies are broadcast by an agent node to any peer nodes in a geographic region that includes the agent node. In some embodiments, the copies are broadcast sequentially (and/or periodically) beginning prior to an estimated point in time when creation of the target block is expected. In some embodiments, where there are multiple copies of multiple different transactions, the agent nodes can prioritize certain transactions among the different transactions to propagate across the network of peer nodes.
- The
method 400 is a non-limiting example of processes for increasing a probability of having a transaction written to a target block. A person skilled in the art would understand that other embodiments within the scope of the disclosure may perform the steps of themethod 400 in another order, omit steps, and/or include additional steps that are well known to persons skilled in the art. -
FIG. 5 is a block diagram of acomputing device 500 ofsystem 300 operable to implement the disclosed technology. The computing device 500 (e.g., agent node 308, peer node 304) may be a generic computer or specifically designed to carry out features ofsystem 300. For example, thecomputing device 500 may be a system-on-chip (SOC), a single-board computer (SBC) system, a desktop or laptop computer, a kiosk, a mainframe, a mesh of computer systems, a handheld mobile device, or combinations thereof. - The
computing device 500 may be a standalone device or part of a distributed system that spans multiple networks, locations, machines, or combinations thereof. In some embodiments, thecomputing device 500 operates as a server computer or a client device in a client-server network environment, or as a peer machine in a peer-to-peer system. In some embodiments, thecomputing device 500 may perform one or more steps of the disclosed embodiments in real time, in near real time, offline, by batch processing, or combinations thereof. - As shown, the
computing device 500 includes a bus 502 operable to transfer data between hardware components. These components include a control 504 (i.e., processing system), anetwork interface 506, an Input/Output (I/O)system 508, and aclock system 510. Thecomputing device 500 may include other components not shown or further discussed for the sake of brevity. One having ordinary skill in the art will understand any hardware and software included but not shown inFIG. 5 . - The
control 504 includes one or more processors 512 (e.g., central processing units (CPUs), application specific integrated circuits (ASICs), and/or field programmable gate arrays (FPGAs)) and memory 514 (which may include software 516). Thememory 514 may include, for example, volatile memory such as random-access memory (RAM) and/or non-volatile memory such as read-only memory (ROM). Thememory 514 can be local, remote, or distributed. - A software program (e.g., software 516), when referred to as “implemented in a computer-readable storage medium,” includes computer-readable instructions stored in a memory (e.g., memory 514). A processor (e.g., processor 512) is “configured to execute a software program” when at least one value associated with the software program is stored in a register that is readable by the processor. In some embodiments, routines executed to implement the disclosed embodiments may be implemented as part of operating system (OS) software (e.g., MICROSOFT WINDOWS, LINUX) or a specific software application, component, program, object, module or sequence of instructions referred to as “computer programs.”
- As such, the computer programs typically comprise one or more instructions set at various times in various memory devices of a computer (e.g., computing device 500) and which, when read and executed by at least one processor (e.g., processor 512), cause the computer to perform operations to execute features involving the various aspects of the disclosed embodiments. In some embodiments, a carrier containing the aforementioned computer program product is provided. The carrier is one of an electronic signal, an optical signal, a radio signal, or a non-transitory computer-readable storage medium (e.g., the memory 514).
- The
network interface 506 may include a modem or other interfaces (not shown) for coupling thecomputing device 500 to other computers over the network 518 (e.g.,network 100, network 302). The I/O system 508 may operate to control various I/O devices, including peripheral devices such as a display system 520 (e.g., a monitor or touch-sensitive display) and one or more input devices 522 (e.g., a keyboard and/or pointing device). Other I/O devices 524 may include, for example, a disk drive, printer, scanner, or the like. Lastly, the clock system 30 controls a timer for use by the disclosed embodiments. - Operation of a memory device (e.g., memory 514), such as a change in state from a binary one to a binary zero (or vice versa) may comprise a visually perceptible physical transformation. The transformation may comprise a physical transformation of an article to a different state or thing. For example, a change in state may involve accumulation and storage of charge or release of stored charge. Likewise, a change of state may comprise a physical change or transformation in magnetic orientation, or a physical change or transformation in molecular structure, such as from crystalline to amorphous or vice versa.
- Aspects of the disclosed embodiments may be described in terms of algorithms and symbolic representations of operations on data bits stored on memory. These algorithmic descriptions and symbolic representations generally include a sequence of operations leading to a desired result. The operations require physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. Customarily, and for convenience, these signals are referred to as bits, values, elements, symbols, characters, terms, numbers, or the like. These and similar terms are associated with physical quantities and are merely convenient labels applied to these quantities.
- While embodiments have been described in the context of fully functioning computers, those skilled in the art will appreciate that the various embodiments are capable of being distributed as a program product in a variety of forms and that the disclosure applies equally regardless of the particular type of machine or computer-readable media used to actually effect the embodiments.
- While the disclosure has been described in terms of several embodiments, those skilled in the art will recognize that the disclosure is not limited to the embodiments described herein and can be practiced with modifications and alterations within the spirit and scope of the invention. Those skilled in the art will also recognize improvements to the embodiments of the present disclosure. All such improvements are considered within the scope of the concepts disclosed herein. Thus, the description is to be regarded as illustrative instead of limiting.
Claims (31)
1. A method for increasing a probability of having a transaction written to a target block of a blockchain, the method comprising:
loading a plurality of copies of a transaction at a plurality of agent nodes connected to a network of peer nodes;
obtaining, by an agent node, an indication of an opportunity to write the transaction to a target block; and
propagating copies of the transaction to the network of peer nodes based on the obtained indication of the opportunity to write the transaction, to improve a probability of having the transaction written to the target block.
2. The method of claim 1 , wherein the copies of the transaction are propagated to a subset of peer nodes that includes a peer node selected as a validator node to write a transaction to the target block.
3. The method of claim 1 , wherein the indication of the opportunity to write the transaction to the target block is sent by a subset of peer nodes.
4. The method of claim 1 , wherein the indication is of another block of the blockchain relative to the target block.
5. The method of claim 1 , wherein the plurality of agent nodes is globally distributed such that each agent node is located at a different geographic region that includes a different subset of peer nodes.
6. The method of claim 1 , wherein the blockchain is a decentralized public blockchain.
7. The method of claim 1 , wherein each agent node is configured to independently monitor a peer node and propagate a transaction to the peer node.
8. The method of claim 1 , wherein each agent node is configured to independently monitor a peer node, propagate a transaction to the peer node, and attempt to be selected by the network of peer nodes to write a transaction to a block of the blockchain.
9. The method of claim 1 , wherein an agent node is randomly selected as a validator node to write a next block of the blockchain.
10. The method of claim 1 , wherein any agent node that wins an auction for an opportunity to write a transaction to a block of the blockchain is selected as a validator node to write a next block of the blockchain.
11. The method of claim 1 , wherein each agent node is operable to adapt based on changing conditions of the network of peer nodes.
12. The method of claim 1 propagating the copies of the transactions further comprises:
responsive to obtaining the indication of the opportunity to write the transaction, broadcasting the copies of the transaction by the agent node to any peer nodes in a geographic region that includes the agent node.
13. The method of claim 1 further comprising, prior to propagating the copies of the transactions:
monitoring the network of peer nodes to determine a probability that the target block will be created at a pre-selected point in time or at a pre-selected point in time relative to a previous block.
14. The method of claim 1 further comprising:
sharing obtained information among the plurality of agent nodes.
15. The method of claim 1 , wherein propagating copies of the transaction comprises:
calculating when to broadcast the copies of the transaction based on an analysis of:
a plurality of transactions written in prior blocks of the blockchain;
a time delay between when a transaction is received and written to a block of the blockchain;
a characteristic of a pending transaction or transaction written to a block of the blockchain;
a characteristic of a block that is not included in the blockchain;
a propagation time for each agent node to receive information indicative of a transaction, creation of a block, a change of validation fees, a change of a quantity of validators, or a statistic of the network of peer nodes; or
a test transaction sent to the network of peer nodes to test, monitor, and gather data about conditions of the network of peer nodes.
16. The method of claim 1 , wherein propagating copies of the transaction comprises:
calculating when to broadcast the copies of the transaction based on an analysis of a threshold of fees required for a transaction to be written to the target block by a validator including any of current validator rewards, changes in validator rewards, or changes in validation difficulty in response to an increase or decrease in a quantity of active validators.
17. The method of claim 1 , wherein the transaction is pre-signed or created and signed in real-time.
18. The method of claim 1 further comprising, prior to propagating the copies of the transaction:
setting an optimal fee associated with the transaction to a value greater than any fee associated with other transactions available to write to the target block.
19. The method of claim 18 , wherein the optimal fee is determined by:
estimating computational resources that the transaction will use;
analyzing fees collected by validators; and
analyzing fees included in other transactions.
20. The method of claim 1 , wherein the target block is associated with a point in time at which the transaction is to be written to the blockchain.
21. The method of claim 1 , wherein the transaction is a purchase of a limited supply of assets of an initial offering.
22. The method of claim 1 , wherein the transaction is one of a temporally ordered set of transactions available for writing to the target block.
23. The method of claim 1 , wherein the blockchain implements a decentralized asset exchange such that the transaction indicates a purchase or sale of an asset.
24. The method of claim 1 , wherein a peer node selected as a validator node is operable to select which of a plurality of transactions is written to the target block.
25. The method of claim 1 , wherein the obtained indication is of a previous block of the blockchain on which a transaction was written.
26. The method of claim 1 , wherein the target block is a next block or subsequent block of the blockchain.
27. The method of claim 1 , wherein a network latency of the network of peer nodes is greater than a network latency of the plurality of agent nodes.
28. The method of claim 1 further comprising, prior to propagating the copies of the transactions:
prioritizing the transaction from a plurality of different transactions for the network of peer nodes.
29. The method of claim 1 , wherein propagating copies of the transaction further comprises:
calculating a point in time to broadcast the transaction based on an analysis of a group of peer nodes with pooled resources that increase a probability that the group of peer nodes will write a next block of the blockchain.
30. The method of claim 1 , wherein propagation of the transaction depends on a group of peer nodes with pooled resources that increase a probability that the group will write a next block of the blockchain.
31. A server computer comprising:
a processor; and
a memory containing instructions that, when executed by the processor, cause the server computer to:
load a plurality of copies of a transaction at a plurality of agent nodes connected to a network of peer nodes;
obtain an indication of an opportunity to write the transaction to a target block; and
propagate copies of the transaction to the network of peer nodes based on the obtained indication of the opportunity to write the transaction, to improve a probability of having the transaction written to the target block.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/005,057 US20200396082A1 (en) | 2017-04-07 | 2020-08-27 | Techniques to incentivize a blockchain network to prioritize state changes |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201762483285P | 2017-04-07 | 2017-04-07 | |
US15/947,511 US10812270B2 (en) | 2017-04-07 | 2018-04-06 | Techniques for increasing the probability that a transaction will be included in a target block of a blockchain |
US17/005,057 US20200396082A1 (en) | 2017-04-07 | 2020-08-27 | Techniques to incentivize a blockchain network to prioritize state changes |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/947,511 Continuation US10812270B2 (en) | 2017-04-07 | 2018-04-06 | Techniques for increasing the probability that a transaction will be included in a target block of a blockchain |
Publications (1)
Publication Number | Publication Date |
---|---|
US20200396082A1 true US20200396082A1 (en) | 2020-12-17 |
Family
ID=63711447
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/947,511 Active 2038-11-11 US10812270B2 (en) | 2017-04-07 | 2018-04-06 | Techniques for increasing the probability that a transaction will be included in a target block of a blockchain |
US17/005,057 Abandoned US20200396082A1 (en) | 2017-04-07 | 2020-08-27 | Techniques to incentivize a blockchain network to prioritize state changes |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/947,511 Active 2038-11-11 US10812270B2 (en) | 2017-04-07 | 2018-04-06 | Techniques for increasing the probability that a transaction will be included in a target block of a blockchain |
Country Status (1)
Country | Link |
---|---|
US (2) | US10812270B2 (en) |
Families Citing this family (50)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170011460A1 (en) * | 2015-07-09 | 2017-01-12 | Ouisa, LLC | Systems and methods for trading, clearing and settling securities transactions using blockchain technology |
CN110741372A (en) | 2017-06-07 | 2020-01-31 | 区块链控股有限公司 | Computer-implemented system and method for managing transactions on a blockchain network |
CN107577694B (en) * | 2017-07-14 | 2020-04-24 | 创新先进技术有限公司 | Data processing method and device based on block chain |
US10643202B2 (en) * | 2017-07-25 | 2020-05-05 | Bank Of America Corporation | Real-time processing distributed ledger system |
US10251053B1 (en) * | 2017-08-02 | 2019-04-02 | Sprint Communications Company L.P. | Embedded subscriber identity module (eSIM) implementation on a wireless communication device using distributed ledger technology (DLT) |
US10298585B1 (en) | 2018-01-26 | 2019-05-21 | Accenture Global Solutions Limited | Blockchain interoperability |
US10713722B2 (en) | 2018-02-14 | 2020-07-14 | Equity Shift, Inc. | Blockchain instrument for transferable equity |
US10699340B2 (en) | 2018-02-14 | 2020-06-30 | Equity Shift, Inc. | Blockchain instrument for transferable equity |
US12008649B1 (en) | 2018-02-14 | 2024-06-11 | Equity Shift, Inc. | Blockchain instrument for transferable equity |
US11625783B1 (en) | 2018-02-14 | 2023-04-11 | Equity Shift, Inc. | Blockchain instrument for transferable equity |
US11164254B1 (en) | 2018-02-14 | 2021-11-02 | Equity Shift, Inc. | Blockchain instrument for transferable equity |
US20190287107A1 (en) * | 2018-03-15 | 2019-09-19 | International Business Machines Corporation | Resource equity for blockchain |
US10721065B2 (en) | 2018-03-29 | 2020-07-21 | Accenture Global Solutions Limited | Active state blockchain synchronization |
CN111869159B (en) * | 2018-04-27 | 2023-05-02 | 株式会社东芝 | Tamper detection system and tamper detection method |
US11568402B2 (en) * | 2018-06-06 | 2023-01-31 | International Business Machines Corporation | Decentralized out-of-band accelerated blockchain transaction processing |
CN110705973B (en) * | 2018-07-10 | 2023-05-16 | 深圳市红砖坊技术有限公司 | Common identification method applied to miner nodes in blockchain system and blockchain system |
US20210234667A1 (en) * | 2018-08-02 | 2021-07-29 | Neuralia Technologies Inc. | Method and system for proof of election on a blockchain |
US10721069B2 (en) | 2018-08-18 | 2020-07-21 | Eygs Llp | Methods and systems for enhancing privacy and efficiency on distributed ledger-based networks |
CA3054228A1 (en) | 2018-09-06 | 2020-03-06 | Intercontinental Exchange Holdings, Inc. | Multi-signature verification network |
WO2020076178A1 (en) * | 2018-10-10 | 2020-04-16 | "Enkri Holding", Limited Liability Company | Linking transactions |
US11146399B2 (en) | 2018-10-19 | 2021-10-12 | Eygs Llp | Methods and systems for retrieving zero-knowledge proof-cloaked data on distributed ledger-based networks |
CN110088793B (en) * | 2018-12-19 | 2023-10-20 | 创新先进技术有限公司 | Data isolation in a blockchain network |
SG11201906831YA (en) | 2018-12-28 | 2019-08-27 | Alibaba Group Holding Ltd | Accelerating transaction deliveries in blockchain networks using acceleration nodes |
EP3571808A4 (en) * | 2018-12-28 | 2020-03-04 | Alibaba Group Holding Limited | Improving blockchain transaction speeds using global acceleration nodes |
JP6892514B2 (en) | 2018-12-28 | 2021-06-23 | アドバンスド ニュー テクノロジーズ カンパニー リミテッド | Accelerate transaction delivery in blockchain networks using transaction retransmission |
CN109948349A (en) * | 2019-01-15 | 2019-06-28 | 苏州链读文化传媒有限公司 | A kind of learning records method and apparatus based on block chain technology |
CN109918866A (en) * | 2019-01-15 | 2019-06-21 | 苏州链读文化传媒有限公司 | A kind of copyright protection method and apparatus based on block chain technology |
CN109801043A (en) * | 2019-02-01 | 2019-05-24 | 苏州链读文化传媒有限公司 | Life cycle learning records authentication device and authentication method based on block chain |
CN110086856B (en) * | 2019-04-01 | 2022-02-01 | 达闼机器人有限公司 | Control method and device of block chain node, storage medium and electronic equipment |
CN111814063B (en) * | 2019-04-12 | 2023-09-15 | 百度在线网络技术(北京)有限公司 | Media information processing method, device, equipment and medium based on block chain |
US11943358B2 (en) | 2019-04-15 | 2024-03-26 | Eygs Llp | Methods and systems for identifying anonymized participants of distributed ledger-based networks using zero-knowledge proofs |
US11502838B2 (en) | 2019-04-15 | 2022-11-15 | Eygs Llp | Methods and systems for tracking and recovering assets stolen on distributed ledger-based networks |
US11677563B2 (en) | 2019-04-15 | 2023-06-13 | Eygs Llp | Systems, apparatus and methods for local state storage of distributed ledger data without cloning |
US10469605B1 (en) | 2019-06-28 | 2019-11-05 | Beatdapp Software Inc. | System and method for scalably tracking media playback using blockchain |
CN110471984B (en) | 2019-07-15 | 2020-08-25 | 阿里巴巴集团控股有限公司 | Service processing method and device based on block chain and electronic equipment |
US11062554B2 (en) * | 2019-07-15 | 2021-07-13 | Igt | Decentralized distributed peer-to-peer wagering architecture and related systems and methods |
US10937096B2 (en) | 2019-07-15 | 2021-03-02 | Advanced New Technologies Co., Ltd. | Transaction processing in a service blockchain |
US11301845B2 (en) * | 2019-08-19 | 2022-04-12 | Anchor Labs, Inc. | Cryptoasset custodial system with proof-of-stake blockchain support |
US11057188B2 (en) * | 2019-08-19 | 2021-07-06 | International Business Machines Corporation | Database service token |
CN110633983A (en) * | 2019-09-05 | 2019-12-31 | 腾讯科技(深圳)有限公司 | Target event execution method and device based on block chain |
CN112769878B (en) * | 2019-11-01 | 2022-09-20 | 中国电信股份有限公司 | Service implementation system and method based on block chain |
CN111199371B (en) * | 2019-12-27 | 2024-02-20 | 航天信息股份有限公司 | Grain circulation tracing release verification method and system based on blockchain |
CN111510309B (en) * | 2020-04-08 | 2022-05-10 | 深圳大学 | Block chain data transmission method, device, equipment and computer readable storage medium |
KR20210150174A (en) * | 2020-06-03 | 2021-12-10 | 삼성전자주식회사 | Electronic device using blockchain and a method thereof |
CN111769984B (en) * | 2020-06-29 | 2022-12-09 | 南京浩澜创达科技有限公司 | Method for adding nodes in block chain network and block chain system |
US20230012276A1 (en) * | 2021-07-07 | 2023-01-12 | Instantgo, Inc. | System, Method, and Apparatus for Decentralized E-Commerce |
US11836714B2 (en) * | 2021-07-07 | 2023-12-05 | Ava Labs, Inc. | Secure and trustworthy bridge for transferring assets across networks with different data architecture |
CN114978634B (en) * | 2022-05-12 | 2024-04-30 | 上海焜耀网络科技有限公司 | Construction and auction method of distributed auction system |
CN114915556B (en) * | 2022-07-19 | 2022-10-21 | 北京航空航天大学 | Calculation task allocation method for industrial internet profit optimization |
CN115766745B (en) * | 2023-01-09 | 2023-05-23 | 杭州安碣信息安全科技有限公司 | Method and device for collecting and broadcasting transaction data of block chain link point memory pool |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9973341B2 (en) * | 2015-01-23 | 2018-05-15 | Daniel Robert Ferrin | Method and apparatus for the limitation of the mining of blocks on a block chain |
GB2531828A (en) * | 2015-03-24 | 2016-05-04 | Intelligent Energy Ltd | An energy resource network |
US10949922B2 (en) * | 2016-06-30 | 2021-03-16 | Chicago Mercantile Exchange Inc. | Derivative contracts that settle based on transaction data |
US10291627B2 (en) * | 2016-10-17 | 2019-05-14 | Arm Ltd. | Blockchain mining using trusted nodes |
CN107078903B (en) * | 2016-12-23 | 2019-12-06 | 深圳前海达闼云端智能科技有限公司 | Ore digging method and device for block chain and node equipment |
US20180197156A1 (en) * | 2017-01-12 | 2018-07-12 | William Eugene Beesley | Distributed micro transactions for software defined networking flows |
CA2998249A1 (en) * | 2017-03-17 | 2018-09-17 | Edatanetworks Inc. | Artificial intelligence engine incenting merchant transaction with consumer affinity |
US10346815B2 (en) * | 2017-09-22 | 2019-07-09 | Kowala Cayman SEZC | System and method of distributed, self-regulating, asset-tracking cryptocurrencies |
US10250708B1 (en) * | 2017-12-26 | 2019-04-02 | Akamai Technologies, Inc. | High performance distributed system of record |
-
2018
- 2018-04-06 US US15/947,511 patent/US10812270B2/en active Active
-
2020
- 2020-08-27 US US17/005,057 patent/US20200396082A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
US20180294967A1 (en) | 2018-10-11 |
US10812270B2 (en) | 2020-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200396082A1 (en) | Techniques to incentivize a blockchain network to prioritize state changes | |
US11303457B2 (en) | Techniques for processing transactions of order-dependent blockchain protocols | |
US11995549B2 (en) | Architectures, systems and methods having segregated secure and public functions | |
CN109964446B (en) | Consensus method based on voting | |
KR20200010905A (en) | Method and system for connecting chain based on dynamic time delay in proof of population based blockchain | |
Gu et al. | Empirical measurements on pricing oracles and decentralized governance for stablecoins | |
Almashaqbeh | Cachecash: A cryptocurrency-based decentralized content delivery network | |
Öz et al. | A Study of MEV Extraction Techniques on a First-Come-First-Served Blockchain | |
Emami et al. | A blockchain-based privacy-preserving anti-collusion data auction mechanism with an off-chain approach | |
KR20190105320A (en) | P2p ledger for fiat money without cryptocurrency | |
Wang et al. | Arbitrage attack: Miners of the world, unite! | |
US20240283667A1 (en) | Two-tier token method and system for an asset-based consensus | |
Alipanahloo et al. | Maximal Extractable Value Mitigation Approaches in Ethereum and Layer-2 Chains: A Comprehensive Survey | |
Andersen | Implementation of a tournament based distributed lottery on Ethereum | |
Chiang | Formal Security and Privacy in Cryptoeconomic Systems | |
Semaan | A novel penalty system to limit profitability of selfish mining | |
KŘÍŽOVÁ | SECURITY AND PRIVACY ORIENTED-SURVEY OF FINANCIAL APPLICATIONS UTILIZING BLOCKCHAIN |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CITIZEN HEX INC., CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ROBERTS, BENJAMIN MARK;BERGMANN, BRETT DAVID;REEL/FRAME:053739/0679 Effective date: 20200910 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |