IMPROVED HARDWARE SECURITY MODULE MANAGEMENT

    公开(公告)号:US20210083856A1

    公开(公告)日:2021-03-18

    申请号:US16620241

    申请日:2018-06-11

    Inventor: Joshua DANIEL

    Abstract: A computer implemented method of a secure computing component to provide access to a cryptographic key, the key being associated with the secure component by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another secure computing component to associate the key with the other component, the request having associated identification information for a requester of the key; responsive to a verification of an entitlement of the requester, generating a new record for storage in the blockchain, the new record associating the key with the other component and being validated by the miner components; and further responsive to the verification, securely transferring the key to the other component so as to provide access to the key to the key requester via the other component.

    ACCESS CONTROL FOR DIGITAL ASSETS

    公开(公告)号:US20210029123A1

    公开(公告)日:2021-01-28

    申请号:US16766437

    申请日:2018-11-20

    Abstract: A computer implemented method of controlling access to a digital asset specifying how an artefact is to be rendered, the method including receiving the digital asset and an indication of a first transaction in a decentralized sequential transactional database; verifying the digital asset by evaluating a digital hash of the asset to compare with a hash stored in the first transaction and, responsive to the verification, securely storing the digital asset; generating a second transaction in the database to indicate the availability of the digital asset for rendering the artefact; receiving a request to access the digital asset by a requesting renderer, the request including an indication of a third transaction in the database; accessing the third transaction and responsive to a determination that the third transaction indicates that the requesting renderer is authorized to access the digital asset for rendering the artefact, securely communicating the digital asset to the requesting renderer.

    ACCESS CONTROL
    5.
    发明申请
    ACCESS CONTROL 审中-公开

    公开(公告)号:US20180225466A1

    公开(公告)日:2018-08-09

    申请号:US15749289

    申请日:2016-07-20

    Abstract: A computer implemented method of access control for a restricted resource of a resource provider in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components, the method including: identifying an access control role definition for access to the resource, the role including a specification of access permissions; defining a cryptocurrency for indicating authorization to access the resource, the cryptocurrency being formed of tradable units of value associated with records in the blockchain and wherein transfer of the cryptocurrency between records in the blockchain is validated by the miners; receiving a request from an authenticated resource consumer for authorization to access the resource; and submitting a blockchain transaction to the miner components to transfer a quantity of cryptocurrency to a consumer record in the blockchain, the transaction including an identification of the role, such that the consumer record identifies that the consumer is authorized to access the resource in accordance with the role definition.

    MITIGATING BLOCKCHAIN ATTACK
    6.
    发明申请
    MITIGATING BLOCKCHAIN ATTACK 有权
    减轻障碍

    公开(公告)号:US20170034197A1

    公开(公告)日:2017-02-02

    申请号:US15223261

    申请日:2016-07-29

    Abstract: A computer implemented method for detecting malicious events occurring with respect to a blockchain data structure comprising: defining a transaction creation profile according to which transactions can be generated and submitted to the blockchain; submitting a transaction to the blockchain, the transaction causing the generation of a profiler data structure in the blockchain including executable code to generate profile transactions to be submitted to the blockchain according to the transaction creation profile; monitoring the blockchain to identify profile transactions; and comparing identified profile transactions with the transaction creation profile to detect a deviation from the transaction creation profile, such detection corresponding to a malicious event occurring with respect to the blockchain.

    Abstract translation: 一种用于检测关于块链数据结构发生的恶意事件的计算机实现的方法,包括:根据哪个事务可以生成并提交给所述块链来定义事务创建简档; 将事务提交给块链,所述事务导致在块链中生成包含可执行代码的轮廓仪数据结构以生成将根据交易创建简档提交到块链的轮廓事务; 监控块链以识别配置文件交易; 以及将所识别的简档事务与所述事务创建简档进行比较以检测与所述事务创建简档的偏差,所述检测对应于相对于所述块链发生的恶意事件。

    IMPROVED NETWORK ACCESS POINT
    7.
    发明申请

    公开(公告)号:US20200178075A1

    公开(公告)日:2020-06-04

    申请号:US16620355

    申请日:2018-06-08

    Inventor: Joshua DANIEL

    Abstract: A computer implemented method of a network access point for secure network access by a mobile computing device, the mobile device being associated with the access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another network access point to associate the mobile device with the other access point, the request having associated identification information for the mobile device; responsive to a verification of an entitlement of the mobile device to access the network, generating a new record for storage in the blockchain, the new record associating the mobile device with the other access point and being validated by the miner components such that the other access point provides access to the network for the mobile device based on the validation of the new record.

    SOFTWARE CONTAINER ACCESS CONTROL
    8.
    发明申请

    公开(公告)号:US20190156047A1

    公开(公告)日:2019-05-23

    申请号:US16300210

    申请日:2017-05-10

    Abstract: An access control method for a restricted resource in a computer system having an operating system providing isolation between software processes executable in the operating system such that a first process executing in the operating system is prevented from accessing resources of a second process executing in the operating system, the method including receiving a software component for execution as an isolated process in the operating system; receiving a baseline profile for the software component defining characteristics of the software component at a runtime for identifying performance of the software component; generating a runtime profile of the software component in execution in the operating system defining characteristics of the component in execution; and permitting access by the software component to the restricted resource based on a comparison of the baseline profile and the runtime profile such that the software component exhibiting undesirable performance is precluded from accessing the restricted resource.

    EXTERNAL FEATURE PROVISION FOR A CLOUD APPLICATION REGISTRY

    公开(公告)号:US20170286136A1

    公开(公告)日:2017-10-05

    申请号:US15508190

    申请日:2015-08-27

    CPC classification number: G06F9/44505 G06F8/61

    Abstract: A computer implemented method to provide a software feature in a registry of software components for a first network attached computing environment, each software component in the registry having associated deployment information to assemble a software application to be executed by the first environment as a set of software components, and the software feature being provided in part by a second network attached computing environment external to the first environment, the method comprising: for a selected software component in the registry, determining compatibility of the software feature with the software component; and responsive to the determination, adapting a registry entry of the software component in the registry to indicate the availability of the software feature for the software component.

    EXTERNAL FEATURE PROVISION FOR CLOUD APPLICATIONS

    公开(公告)号:US20170286083A1

    公开(公告)日:2017-10-05

    申请号:US15508209

    申请日:2015-08-27

    CPC classification number: G06F8/61 G06F9/44505 G06F9/45508 H04L67/34

    Abstract: A computer implemented method to execute a software application in a first network attached computing environment comprising: receiving a definition of the application, the definition identifying a set of software components and including configuration information for installing and executing the components in the first environment; installing and configuring the components in the first environment in accordance with the definition, wherein the definition further includes, for an identified component in the set, software agent information about a software agent that implements part of a software feature, the agent being provided by a second network attached computing environment external to and communicatively connected with the first environment, the second environment providing another part of the software feature, the method further comprising obtaining, installing and configuring the agent based on the agent information to provide part of the software feature for the application.

Patent Agency Ranking