Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to provide fabric nodes of a network, including a first fabric node receiving a client request to perform one or more actions with respect to digital content corresponding to a plurality of content object parts maintained in the network. A lookup is performed on a blockchain ledger in a first blockchain to locate a digital instrument cryptographically linked to a user identifier (ID) of an owner of the digital content. The first fabric node grants the client request based on determining that a user ID associated with the client request matches the user ID of the owner of the digital content. The one or more actions are then performed through a blockchain transaction in the first blockchain or another blockchain.
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 67/1074 - Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
H04L 67/1087 - Peer-to-peer [P2P] networks using cross-functional networking aspects
H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
H04L 69/325 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the network layer [OSI layer 3], e.g. X.25
H04L 69/329 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to execute a software stack to define a fabric node of a plurality of fabric nodes of an overlay network situated in an application layer differentiated from an internet protocol layer. The defined fabric node is configured to: obtain a request for digital content from a client device; obtain, from one or more of the plurality of fabric nodes, a plurality of content object parts of a content object representing, in the overlay network, at least a portion of the digital content; generate consumable media using: raw data stored in the content object parts, metadata stored in the content object parts, and build instructions stored in the content object parts; and provide the consumable media to the client device. In some instances, the consumable media is further generated using a digital contract stored in a blockchain.
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 67/1074 - Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
H04L 67/1087 - Peer-to-peer [P2P] networks using cross-functional networking aspects
H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
H04L 69/325 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the network layer [OSI layer 3], e.g. X.25
H04L 69/329 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
3.
Access control and ownership transfer of digital content using a decentralized content fabric and ledger
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to provide fabric nodes of an overlay network, including one or more fabric nodes that receive a client's request to access digital content on the overlay network. The request includes an authorization token digitally signed by or on behalf of a user of the client. The fabric node(s) extract a user identifier (ID) from the authorization token, then determine that one or more rules maintained on the overlay network are satisfied. The one or more rules condition access to the digital content upon the extracted user ID matching an ID associated with an owner of a digital instrument. The digital instrument, which can be a non-fungible token, is stored in a blockchain ledger as a unique representation of the digital content.
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 67/1074 - Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
H04L 67/1087 - Peer-to-peer [P2P] networks using cross-functional networking aspects
H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
H04L 69/325 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the network layer [OSI layer 3], e.g. X.25
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to execute a software stack to define a fabric node of a plurality of fabric nodes of an overlay network situated in an application layer differentiated from an internet protocol layer. The defined fabric node is configured to: obtain a request for digital content from a client device; obtain, from one or more of the plurality of fabric nodes, a plurality of content object parts of a content object representing, in the overlay network, at least a portion of the digital content; generate consumable media using: raw data stored in the content object parts, metadata stored in the content object parts, and build instructions stored in the content object parts; and provide the consumable media to the client device. In some instances, the consumable media is further generated using a digital contract stored in a blockchain.
H04L 45/64 - Routing or path finding of packets in data switching networks using an overlay routing layer
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 41/00 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
H04L 49/25 - Routing or path finding in a switch fabric
H04L 69/325 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the network layer [OSI layer 3], e.g. X.25
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to provide fabric nodes of an overlay network, including one or more fabric nodes that receive a client's request to access digital content on the overlay network. The request includes an authorization token digitally signed by or on behalf of a user of the client. The fabric node(s) extract a user identifier (ID) from the authorization token, then determine that one or more rules maintained on the overlay network are satisfied. The one or more rules condition access to the digital content upon the extracted user ID matching an ID associated with an owner of a digital instrument. The digital instrument, which can be a non-fungible token, is stored in a blockchain ledger as a unique representation of the digital content.
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
6.
Access control and ownership transfer of digital content using a decentralized content fabric and ledger
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to provide fabric nodes of an overlay network, including one or more fabric nodes that receive a client's request to access digital content on the overlay network. The request includes an authorization token digitally signed by or on behalf of a user of the client. The fabric node(s) extract a user identifier (ID) from the authorization token, then determine that one or more rules maintained on the overlay network are satisfied. The one or more rules condition access to the digital content upon the extracted user ID matching an ID associated with an owner of a digital instrument. The digital instrument, which can be a non-fungible token, is stored in a blockchain ledger as a unique representation of the digital content.
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 45/64 - Routing or path finding of packets in data switching networks using an overlay routing layer
H04L 41/00 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
H04L 49/25 - Routing or path finding in a switch fabric
H04L 69/325 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the network layer [OSI layer 3], e.g. X.25
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to execute a software stack to define a fabric node of a plurality of fabric nodes of an overlay network situated in an application layer differentiated from an internet protocol layer. The defined fabric node is configured to: obtain a request for digital content from a client device; obtain, from one or more of the plurality of fabric nodes, a plurality of content object parts of a content object representing, in the overlay network, at least a portion of the digital content; generate consumable media using: raw data stored in the content object parts, metadata stored in the content object parts, and build instructions stored in the content object parts; and provide the consumable media to the client device. In some instances, the consumable media is further generated using a digital contract stored in a blockchain.
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
H04L 12/715 - Hierarchical routing, e.g. clustered networks or inter-domain routing
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 12/24 - Arrangements for maintenance or administration
H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 12/933 - Switch core, e.g. crossbar, shared memory or shared medium
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized system for security and access control associated with digital content. In some implementations, a software stack is executed to provide fabric nodes of an overlay network. A transaction encrypted with a private key of a client can be recorded in a ledger identifying addresses of fabric nodes of the overlay network. The transaction can be identified by a transaction identifier (ID), and the private key can be part of a public/private key pair representing an account of the client on the ledger. A digital contract can be invoked, where the digital contract represents one or more terms of access for digital content stored in the overlay network. Controlled client access to the digital content can be based on an authorization token obtained from the client.
H04L 12/715 - Hierarchical routing, e.g. clustered networks or inter-domain routing
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 12/24 - Arrangements for maintenance or administration
H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 12/933 - Switch core, e.g. crossbar, shared memory or shared medium
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of digital content retrieval using a decentralized content fabric. In some implementations, fabric nodes of an overlay network are provided. A first fabric node is configured to: determine, responsive to a client request for a content object part, that the content object part is not stored locally at the first fabric node; identify a second one or more fabric nodes as a best match; send a network request for the content object part to the second one or more fabric nodes; obtain the content object part from the second one or more fabric nodes; and process the content object part with further content object parts to produce the digital content for the client.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 12/715 - Hierarchical routing, e.g. clustered networks or inter-domain routing
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 12/24 - Arrangements for maintenance or administration
H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 12/933 - Switch core, e.g. crossbar, shared memory or shared medium
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. Some implementations are associated with a network configured to manage content object parts representing digital content. A content object part includes raw data, metadata, and build instructions. The network includes: a data layer storing the raw data and the metadata of the content object parts, a code layer storing the build instructions of the content object parts, a contract layer storing a digital contract associated with the content object parts, and a ledger configured to record one or more transactions. Digital output can be provided by at least processing the build instructions and the digital contract in relation to the raw data and the metadata.
H04L 45/64 - Routing or path finding of packets in data switching networks using an overlay routing layer
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 41/00 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
H04L 49/25 - Routing or path finding in a switch fabric
H04L 69/325 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the network layer [OSI layer 3], e.g. X.25
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric for secure content publishing in an overlay network. In some implementations, a request to create digital content is obtained from a client. The request includes a call on a library contract associated with a content library. A transaction identifying the request is recorded in a ledger. A transaction ID and a content ID are sent to the client. An authorization token including the transaction ID and the content ID is then obtained from the client. Authorization of a content creator can be verified based on the authorization token. A write token can then be sent to the client. A content object part encrypted with a content encryption key set and designated for publishing to the overlay network can then be obtained from the client.
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to execute a software stack to define a fabric node of a plurality of fabric nodes of an overlay network situated in an application layer differentiated from an internet protocol layer. The defined fabric node is configured to: obtain a request for digital content from a client device; obtain, from one or more of the plurality of fabric nodes, a plurality of content object parts of a content object representing, in the overlay network, at least a portion of the digital content; generate consumable media using: raw data stored in the content object parts, metadata stored in the content object parts, and build instructions stored in the content object parts; and provide the consumable media to the client device. In some instances, the consumable media is further generated using a digital contract stored in a blockchain.
H04L 12/721 - Routing procedures, e.g. shortest path routing, source routing, link state routing or distance vector routing
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 12/24 - Arrangements for maintenance or administration
H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 12/933 - Switch core, e.g. crossbar, shared memory or shared medium
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of machine learning for a decentralized content-centric system. In some implementations, predicted scores are obtained for a subset of fabric nodes of an overlay network. The scores can be based on prior training. A top scoring fabric node of the subset is identified as an egress node for communicating with a client. Also obtained are predicted scores for egress-origin segments defining paths in the overlay network between the egress node and origin nodes of the fabric nodes. The origin nodes store a content object part associated with digital content. One or more of the egress-origin segments is identified as being top scoring and is configured to be processed to identify one of the origin nodes for providing the content object part.
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric for publishing digital content to an overlay network. In some implementations, fabric nodes of the overlay network are implemented in an application layer differentiated from an internet protocol layer. A first fabric node is configured to: obtain a client request to publish a content object part to the overlay network; determine a target partition of the overlay network in which to store the content object part; send a network request to provide the content object part to a second one or more fabric nodes; obtain one or more messages indicating that the second one or more fabric nodes stores the target partition; and publish the content object part to the second one or more fabric nodes for storage.
H04L 12/715 - Hierarchical routing, e.g. clustered networks or inter-domain routing
H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch
H04L 12/24 - Arrangements for maintenance or administration
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 12/933 - Switch core, e.g. crossbar, shared memory or shared medium
Disclosed are examples of decentralized systems and related apparatus, devices, computer program products, and methods for secure access of digital content. In some implementations, a first request from a client to access encrypted digital content includes a call on a digital contract. The call passes an ephemeral key set encrypted with a public key of a consumer. A transaction identifying the first request in association with the encrypted ephemeral key set is recorded in the digital contract. The transaction is identified by a transaction identifier (ID), which is sent to the client. A second request from the client includes: an authorization token including the transaction ID, and a signature of the consumer. Authorization of the consumer is verified based on the authorization token. A transaction identifying one or more keys is recorded in the digital contract. The digital content can be re-encrypted and sent to the client.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Disclosed are examples of decentralized systems and related apparatus, devices, computer program products, and methods for distributing digital content. In some implementations, an overlay network of fabric nodes is implemented in an application layer differentiated from an internet protocol layer. One or more network-wide parameters and a node identifier (ID) identifying a fabric node are obtained. A set of partition identifiers (IDs) for the node ID is determined using the one or more network-wide parameters. The partition IDs identify partitions to be managed by the fabric node. At least a portion of digital content in the overlay network can be distributed using a partition ID.
H04L 12/933 - Switch core, e.g. crossbar, shared memory or shared medium
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to execute a software stack to define a fabric node of a plurality of fabric nodes of an overlay network situated in an application layer differentiated from an internet protocol layer. The defined fabric node is configured to: obtain a request for digital content from a client device; obtain, from one or more of the plurality of fabric nodes, a plurality of content object parts of a content object representing, in the overlay network, at least a portion of the digital content; generate consumable media using: raw data stored in the content object parts, metadata stored in the content object parts, and build instructions stored in the content object parts; and provide the consumable media to the client device. In some instances, the consumable media is further generated using a digital contract stored in a blockchain.
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to execute a software stack to define a fabric node of a plurality of fabric nodes of an overlay network situated in an application layer differentiated from an internet protocol layer. The defined fabric node is configured to: obtain a request for digital content from a client device; obtain, from one or more of the plurality of fabric nodes, a plurality of content object parts of a content object representing, in the overlay network, at least a portion of the digital content; generate consumable media using: raw data stored in the content object parts, metadata stored in the content object parts, and build instructions stored in the content object parts; and provide the consumable media to the client device. In some instances, the consumable media is further generated using a digital contract stored in a blockchain.
H04L 12/715 - Hierarchical routing, e.g. clustered networks or inter-domain routing
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 12/24 - Arrangements for maintenance or administration
H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 12/933 - Switch core, e.g. crossbar, shared memory or shared medium
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists