-
公开(公告)号:US20210083856A1
公开(公告)日:2021-03-18
申请号:US16620241
申请日:2018-06-11
Inventor: Joshua DANIEL
Abstract: A computer implemented method of a secure computing component to provide access to a cryptographic key, the key being associated with the secure component by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another secure computing component to associate the key with the other component, the request having associated identification information for a requester of the key; responsive to a verification of an entitlement of the requester, generating a new record for storage in the blockchain, the new record associating the key with the other component and being validated by the miner components; and further responsive to the verification, securely transferring the key to the other component so as to provide access to the key to the key requester via the other component.
-
公开(公告)号:US20180285585A1
公开(公告)日:2018-10-04
申请号:US15939650
申请日:2018-03-29
Inventor: Joshua DANIEL , Xiaofeng DU , Gery DUCATEL
Abstract: A computer implemented method for access control for a restricted resource in a computer system is disclosed. A related computer system is also disclosed.
-
公开(公告)号:US20210029123A1
公开(公告)日:2021-01-28
申请号:US16766437
申请日:2018-11-20
Inventor: Iain MONTEATH , Joshua DANIEL , Jonathan TATE
IPC: H04L29/06 , G05B19/4099 , G06F16/18
Abstract: A computer implemented method of controlling access to a digital asset specifying how an artefact is to be rendered, the method including receiving the digital asset and an indication of a first transaction in a decentralized sequential transactional database; verifying the digital asset by evaluating a digital hash of the asset to compare with a hash stored in the first transaction and, responsive to the verification, securely storing the digital asset; generating a second transaction in the database to indicate the availability of the digital asset for rendering the artefact; receiving a request to access the digital asset by a requesting renderer, the request including an indication of a third transaction in the database; accessing the third transaction and responsive to a determination that the third transaction indicates that the requesting renderer is authorized to access the digital asset for rendering the artefact, securely communicating the digital asset to the requesting renderer.
-
公开(公告)号:US20190340361A1
公开(公告)日:2019-11-07
申请号:US16086058
申请日:2017-03-03
Inventor: Joshua DANIEL , Gery DUCATEL , Mohammad ZOUALFAGHARI
Abstract: Disclosed herein is a computer implemented method for receiving code distributed by a base station at a target device via a network, the distribution being made to one or more destination devices including the target device via one or more distribution servers arranged between the base station and the one or more devices on the network, wherein the base station maintains a first blockchain data structure storing one or more blocks and having a state determined by a most recently committed block in the first blockchain.
-
公开(公告)号:US20180225466A1
公开(公告)日:2018-08-09
申请号:US15749289
申请日:2016-07-20
Inventor: Gery DUCATEL , Theo DIMITRAKOS , Joshua DANIEL
CPC classification number: G06F21/62 , G06F21/10 , G06Q20/065 , H04L9/0637 , H04L9/3247 , H04L63/10 , H04L63/12 , H04L2209/16
Abstract: A computer implemented method of access control for a restricted resource of a resource provider in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components, the method including: identifying an access control role definition for access to the resource, the role including a specification of access permissions; defining a cryptocurrency for indicating authorization to access the resource, the cryptocurrency being formed of tradable units of value associated with records in the blockchain and wherein transfer of the cryptocurrency between records in the blockchain is validated by the miners; receiving a request from an authenticated resource consumer for authorization to access the resource; and submitting a blockchain transaction to the miner components to transfer a quantity of cryptocurrency to a consumer record in the blockchain, the transaction including an identification of the role, such that the consumer record identifies that the consumer is authorized to access the resource in accordance with the role definition.
-
公开(公告)号:US20170034197A1
公开(公告)日:2017-02-02
申请号:US15223261
申请日:2016-07-29
Inventor: Joshua DANIEL , Gery DUCATEL , Theo DIMITRAKOS
CPC classification number: H04L63/1425 , G06Q20/065 , G06Q2220/00 , H04L9/3236 , H04L63/1416 , H04L63/1458 , H04L2209/38 , H04L2209/56 , H04L2463/102
Abstract: A computer implemented method for detecting malicious events occurring with respect to a blockchain data structure comprising: defining a transaction creation profile according to which transactions can be generated and submitted to the blockchain; submitting a transaction to the blockchain, the transaction causing the generation of a profiler data structure in the blockchain including executable code to generate profile transactions to be submitted to the blockchain according to the transaction creation profile; monitoring the blockchain to identify profile transactions; and comparing identified profile transactions with the transaction creation profile to detect a deviation from the transaction creation profile, such detection corresponding to a malicious event occurring with respect to the blockchain.
Abstract translation: 一种用于检测关于块链数据结构发生的恶意事件的计算机实现的方法,包括:根据哪个事务可以生成并提交给所述块链来定义事务创建简档; 将事务提交给块链,所述事务导致在块链中生成包含可执行代码的轮廓仪数据结构以生成将根据交易创建简档提交到块链的轮廓事务; 监控块链以识别配置文件交易; 以及将所识别的简档事务与所述事务创建简档进行比较以检测与所述事务创建简档的偏差,所述检测对应于相对于所述块链发生的恶意事件。
-
公开(公告)号:US20200178075A1
公开(公告)日:2020-06-04
申请号:US16620355
申请日:2018-06-08
Inventor: Joshua DANIEL
Abstract: A computer implemented method of a network access point for secure network access by a mobile computing device, the mobile device being associated with the access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another network access point to associate the mobile device with the other access point, the request having associated identification information for the mobile device; responsive to a verification of an entitlement of the mobile device to access the network, generating a new record for storage in the blockchain, the new record associating the mobile device with the other access point and being validated by the miner components such that the other access point provides access to the network for the mobile device based on the validation of the new record.
-
公开(公告)号:US20190156047A1
公开(公告)日:2019-05-23
申请号:US16300210
申请日:2017-05-10
Inventor: Joshua DANIEL , Fadi EL-MOUSSA
Abstract: An access control method for a restricted resource in a computer system having an operating system providing isolation between software processes executable in the operating system such that a first process executing in the operating system is prevented from accessing resources of a second process executing in the operating system, the method including receiving a software component for execution as an isolated process in the operating system; receiving a baseline profile for the software component defining characteristics of the software component at a runtime for identifying performance of the software component; generating a runtime profile of the software component in execution in the operating system defining characteristics of the component in execution; and permitting access by the software component to the restricted resource based on a comparison of the baseline profile and the runtime profile such that the software component exhibiting undesirable performance is precluded from accessing the restricted resource.
-
公开(公告)号:US20170286136A1
公开(公告)日:2017-10-05
申请号:US15508190
申请日:2015-08-27
Inventor: Theo DIMITRAKOS , Joshua DANIEL , Fadi EL-MOUSSA , Gery DUCATEL
IPC: G06F9/445
CPC classification number: G06F9/44505 , G06F8/61
Abstract: A computer implemented method to provide a software feature in a registry of software components for a first network attached computing environment, each software component in the registry having associated deployment information to assemble a software application to be executed by the first environment as a set of software components, and the software feature being provided in part by a second network attached computing environment external to the first environment, the method comprising: for a selected software component in the registry, determining compatibility of the software feature with the software component; and responsive to the determination, adapting a registry entry of the software component in the registry to indicate the availability of the software feature for the software component.
-
公开(公告)号:US20170286083A1
公开(公告)日:2017-10-05
申请号:US15508209
申请日:2015-08-27
Inventor: Theo DIMITRAKOS , Joshua DANIEL , Fadi EL-MOUSSA , Gery DUCATEL
CPC classification number: G06F8/61 , G06F9/44505 , G06F9/45508 , H04L67/34
Abstract: A computer implemented method to execute a software application in a first network attached computing environment comprising: receiving a definition of the application, the definition identifying a set of software components and including configuration information for installing and executing the components in the first environment; installing and configuring the components in the first environment in accordance with the definition, wherein the definition further includes, for an identified component in the set, software agent information about a software agent that implements part of a software feature, the agent being provided by a second network attached computing environment external to and communicatively connected with the first environment, the second environment providing another part of the software feature, the method further comprising obtaining, installing and configuring the agent based on the agent information to provide part of the software feature for the application.
-
-
-
-
-
-
-
-
-