USER AUTHENTICATION
    3.
    发明公开
    USER AUTHENTICATION 审中-公开

    公开(公告)号:US20240073207A1

    公开(公告)日:2024-02-29

    申请号:US18256439

    申请日:2021-11-25

    CPC classification number: H04L63/0861 H04L63/107

    Abstract: A computer implemented method for authenticating a user, the method including receiving an authentication request from a first computer system, the authentication request including an indication of an identity of the user to be authenticated; receiving one or more authentication factors for verifying the identity of the user, the one or more authentication factors including at least one authentication factor obtained from a second computer system associated with the user having the indicated identity; receiving an auxiliary authentication factor, the auxiliary authentication factor comprising data for verifying that the second computer system is currently in the possession of the user having the indicated identity; and verifying the identity of the user based on the one or more authentication factors and the auxiliary authentication factor.

    DATA ACESS AUTHENICATION
    5.
    发明申请

    公开(公告)号:US20190273781A1

    公开(公告)日:2019-09-05

    申请号:US16292683

    申请日:2019-03-05

    Abstract: A computer implemented method of a network connected data storage system, the method including receiving, via the network, and storing a data set including a plurality of data items encrypted using an index-based searchable encryption scheme, wherein the searchable encryption scheme has associated a server index and a client index; receiving, via the network, and storing a set of hashed information for each of a plurality of queries of the data set, each item of hashed information including a hash of a query and a hash of an expected result of executing the query using the server index; receiving, via the network, a query from a data requester to retrieve a set of data items from the data store and a hash of an expected result of executing the received query using the server index; generating a result of the received query for the data set based on the server index; and responsive to a comparison of a hash of the generated result, the received hash of the expected result, and the hashes of expected results in the set of hashed information, granting access for the requester to the data set.

    EXPENDABLE ACCESS CONTROL
    6.
    发明申请

    公开(公告)号:US20180225469A1

    公开(公告)日:2018-08-09

    申请号:US15749338

    申请日:2016-07-20

    Abstract: A computer implemented method of a resource provider for access control for a restricted resource in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components including a provider record associated with the resource provider, the method including: identifying an access control role definition for access to the resource, the role including a specification of access permissions; receiving a request from a resource consumer for access to the resource; communicating, to the resource consumer, an indication of a quantity of a cryptocurrency required for access to the resource; and in response to a determination that the required quantity of cryptocurrency is transferred to the provider record in the blockchain, the transfer being caused by a blockchain transaction including an identification of the role and the transaction being validated by a miner component, granting the consumer access to the resource in accordance with the role definition.

    VALIDATING COMPUTER RESOURCE USAGE
    7.
    发明申请

    公开(公告)号:US20180025166A1

    公开(公告)日:2018-01-25

    申请号:US15548654

    申请日:2016-02-10

    CPC classification number: G06F21/602 G06F9/5011 G06Q10/06

    Abstract: A computer implemented method for validating use of a computing resource by a requester software component including: validating a characteristic of the requester; generating a first transaction defining criteria for consumption of the resource by the requester, the first transaction being encrypted with a private key from a public key/private key pair and being added as part of a block of transactions to a blockchain data structure; generating a subsequent encrypted transaction corresponding to a request of the requester to consume the resource, the subsequent transaction referring to the first transaction, wherein the subsequent transaction is validated by a transaction miner computing component from a plurality of miners by authenticating the transaction using the public key and verifying compliance with the criteria defined in each transaction.

    USER DEVICE CONFIGURATION
    8.
    发明公开

    公开(公告)号:US20230239304A1

    公开(公告)日:2023-07-27

    申请号:US18002706

    申请日:2021-06-15

    CPC classification number: H04L63/102 H04L63/20

    Abstract: A method of configuring a user device. The method includes sending, from the user device to a node of a distributed ledger network (DLN), the node configured to store a distributed ledger of the DLN, a request for characteristic data indicative of a characteristic associated with a service provider, receiving, at the user device, a response from the node of the DLN in response to the request, and configuring a functionality of the user device accessible to the service provider, based at least in part on the response from the node of the DLN. Further aspects relate to a data processing system, a network, and a method of operating a network.

    SECURE COMMUNICATION OF USER DEVICE DATA
    9.
    发明公开

    公开(公告)号:US20230239154A1

    公开(公告)日:2023-07-27

    申请号:US18002704

    申请日:2021-06-15

    CPC classification number: H04L9/3231 H04L9/0866

    Abstract: A method for facilitating secure communication between a user device and a network device. Encrypted data from a user device is received at the network device. The encrypted data is encrypted based on first physiological data captured by a first sensor of the user device. The first physiological data is representative of a physiological characteristic of a user of the user device. A second sensor of the network device captures second physiological data representative of the physiological characteristic of the user. A common key for encrypting further data transferred between the user device and the network device is determined, based on the encrypted data and the second physiological data. Further aspects relate to other methods for facilitating secure communication between a user and network device, a network, and a method of operating a network.

    EXTERNAL FEATURE PROVISION FOR A CLOUD APPLICATION REGISTRY

    公开(公告)号:US20170286136A1

    公开(公告)日:2017-10-05

    申请号:US15508190

    申请日:2015-08-27

    CPC classification number: G06F9/44505 G06F8/61

    Abstract: A computer implemented method to provide a software feature in a registry of software components for a first network attached computing environment, each software component in the registry having associated deployment information to assemble a software application to be executed by the first environment as a set of software components, and the software feature being provided in part by a second network attached computing environment external to the first environment, the method comprising: for a selected software component in the registry, determining compatibility of the software feature with the software component; and responsive to the determination, adapting a registry entry of the software component in the registry to indicate the availability of the software feature for the software component.

Patent Agency Ranking