-
公开(公告)号:US20200295941A1
公开(公告)日:2020-09-17
申请号:US16086074
申请日:2017-03-03
Inventor: Joshua DANIEL , Gery DUCATEL , Mohammad ZOUALFAGHARI
Abstract: A computer implemented method for code distribution by a base station to a target device via a network, the distribution being made via one or more distribution servers arranged between the base station and the target device on the network, is disclosed.
-
公开(公告)号:US20180225611A1
公开(公告)日:2018-08-09
申请号:US15749391
申请日:2016-07-20
Inventor: Joshua DANIEL , Gery DUCATEL , Theo DIMITRAKOS
CPC classification number: G06Q10/06315 , G06F16/27 , G06F21/6236 , G06Q20/065
Abstract: A computer implemented method to provide allocation of one or more computing resources for a consumer computing component, each resource having a resource type and being provided by one or more resource providers, and the consumer having associated a quantity of tradeable value constraining an extent of resource consumption.
-
公开(公告)号:US20240073207A1
公开(公告)日:2024-02-29
申请号:US18256439
申请日:2021-11-25
Inventor: Gabriele GELARDI , Max SMITH-CREASEY , Gery DUCATEL
IPC: H04L9/40
CPC classification number: H04L63/0861 , H04L63/107
Abstract: A computer implemented method for authenticating a user, the method including receiving an authentication request from a first computer system, the authentication request including an indication of an identity of the user to be authenticated; receiving one or more authentication factors for verifying the identity of the user, the one or more authentication factors including at least one authentication factor obtained from a second computer system associated with the user having the indicated identity; receiving an auxiliary authentication factor, the auxiliary authentication factor comprising data for verifying that the second computer system is currently in the possession of the user having the indicated identity; and verifying the identity of the user based on the one or more authentication factors and the auxiliary authentication factor.
-
公开(公告)号:US20180285585A1
公开(公告)日:2018-10-04
申请号:US15939650
申请日:2018-03-29
Inventor: Joshua DANIEL , Xiaofeng DU , Gery DUCATEL
Abstract: A computer implemented method for access control for a restricted resource in a computer system is disclosed. A related computer system is also disclosed.
-
公开(公告)号:US20190273781A1
公开(公告)日:2019-09-05
申请号:US16292683
申请日:2019-03-05
Inventor: Joshua DANIEL , Gery DUCATEL
IPC: H04L29/08 , H04L29/06 , G06F16/14 , G06F16/182 , G06F16/9538 , H04L9/06
Abstract: A computer implemented method of a network connected data storage system, the method including receiving, via the network, and storing a data set including a plurality of data items encrypted using an index-based searchable encryption scheme, wherein the searchable encryption scheme has associated a server index and a client index; receiving, via the network, and storing a set of hashed information for each of a plurality of queries of the data set, each item of hashed information including a hash of a query and a hash of an expected result of executing the query using the server index; receiving, via the network, a query from a data requester to retrieve a set of data items from the data store and a hash of an expected result of executing the received query using the server index; generating a result of the received query for the data set based on the server index; and responsive to a comparison of a hash of the generated result, the received hash of the expected result, and the hashes of expected results in the set of hashed information, granting access for the requester to the data set.
-
公开(公告)号:US20180225469A1
公开(公告)日:2018-08-09
申请号:US15749338
申请日:2016-07-20
Inventor: Joshua DANIEL , Gery DUCATEL , Theo DIMITRAKOS
CPC classification number: G06F21/629 , G06F21/10 , G06F21/602 , G06F21/62 , G06F2221/2141 , G06Q20/3678 , G06Q20/401 , H04L9/0637 , H04L63/10
Abstract: A computer implemented method of a resource provider for access control for a restricted resource in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components including a provider record associated with the resource provider, the method including: identifying an access control role definition for access to the resource, the role including a specification of access permissions; receiving a request from a resource consumer for access to the resource; communicating, to the resource consumer, an indication of a quantity of a cryptocurrency required for access to the resource; and in response to a determination that the required quantity of cryptocurrency is transferred to the provider record in the blockchain, the transfer being caused by a blockchain transaction including an identification of the role and the transaction being validated by a miner component, granting the consumer access to the resource in accordance with the role definition.
-
公开(公告)号:US20180025166A1
公开(公告)日:2018-01-25
申请号:US15548654
申请日:2016-02-10
Inventor: Joshua DANIEL , Theo DIMITRAKOS , Gery DUCATEL
CPC classification number: G06F21/602 , G06F9/5011 , G06Q10/06
Abstract: A computer implemented method for validating use of a computing resource by a requester software component including: validating a characteristic of the requester; generating a first transaction defining criteria for consumption of the resource by the requester, the first transaction being encrypted with a private key from a public key/private key pair and being added as part of a block of transactions to a blockchain data structure; generating a subsequent encrypted transaction corresponding to a request of the requester to consume the resource, the subsequent transaction referring to the first transaction, wherein the subsequent transaction is validated by a transaction miner computing component from a plurality of miners by authenticating the transaction using the public key and verifying compliance with the criteria defined in each transaction.
-
公开(公告)号:US20230239304A1
公开(公告)日:2023-07-27
申请号:US18002706
申请日:2021-06-15
Inventor: Gery DUCATEL , Mamun ABU-TAIR , Zhan CUI , Joseph RAFFERTY , Hanif ULLAH , Aftab ALI , Philip MORROW
IPC: H04L9/40
CPC classification number: H04L63/102 , H04L63/20
Abstract: A method of configuring a user device. The method includes sending, from the user device to a node of a distributed ledger network (DLN), the node configured to store a distributed ledger of the DLN, a request for characteristic data indicative of a characteristic associated with a service provider, receiving, at the user device, a response from the node of the DLN in response to the request, and configuring a functionality of the user device accessible to the service provider, based at least in part on the response from the node of the DLN. Further aspects relate to a data processing system, a network, and a method of operating a network.
-
公开(公告)号:US20230239154A1
公开(公告)日:2023-07-27
申请号:US18002704
申请日:2021-06-15
Inventor: Aftab ALI , Gery DUCATEL , Zhan CUI , Mamun ABU-TAIR , Joseph RAFFERTY , Hanif ULLAH , Philip MORROW
CPC classification number: H04L9/3231 , H04L9/0866
Abstract: A method for facilitating secure communication between a user device and a network device. Encrypted data from a user device is received at the network device. The encrypted data is encrypted based on first physiological data captured by a first sensor of the user device. The first physiological data is representative of a physiological characteristic of a user of the user device. A second sensor of the network device captures second physiological data representative of the physiological characteristic of the user. A common key for encrypting further data transferred between the user device and the network device is determined, based on the encrypted data and the second physiological data. Further aspects relate to other methods for facilitating secure communication between a user and network device, a network, and a method of operating a network.
-
公开(公告)号:US20170286136A1
公开(公告)日:2017-10-05
申请号:US15508190
申请日:2015-08-27
Inventor: Theo DIMITRAKOS , Joshua DANIEL , Fadi EL-MOUSSA , Gery DUCATEL
IPC: G06F9/445
CPC classification number: G06F9/44505 , G06F8/61
Abstract: A computer implemented method to provide a software feature in a registry of software components for a first network attached computing environment, each software component in the registry having associated deployment information to assemble a software application to be executed by the first environment as a set of software components, and the software feature being provided in part by a second network attached computing environment external to the first environment, the method comprising: for a selected software component in the registry, determining compatibility of the software feature with the software component; and responsive to the determination, adapting a registry entry of the software component in the registry to indicate the availability of the software feature for the software component.
-
-
-
-
-
-
-
-
-