SECURING DATA OBJECTS THROUGH BLOCKCHAIN COMPUTER PROGRAMS

    公开(公告)号:US20190199689A1

    公开(公告)日:2019-06-27

    申请号:US15849760

    申请日:2017-12-21

    Applicant: SAP SE

    CPC classification number: H04L63/0428 H04L9/0819 H04L63/061

    Abstract: A computer program is initialized within a distributed network. The computer program includes one or more conditions for accessing data associated with the computer program. One or more values for initializing one or more parameters within the one or more conditions are loaded. The one or more parameters are initialized based on data in a number of data blocks of the blockchain. The number of data blocks is stored at a number of computer systems connected to the distributed network. A request associated with providing a data object to the distributed network is received. Based on evaluation of the request, the data object is stored at the computer program. A second request to retrieve the data object is rejected by the computer program when a retrieving condition of the one or more conditions is not fulfilled.

    MAPPING COMPUTER PROGRAMS TO NETWORK PROTOCOL METHODS

    公开(公告)号:US20190188063A1

    公开(公告)日:2019-06-20

    申请号:US15845449

    申请日:2017-12-18

    Applicant: SAP SE

    Abstract: A request to deploy a computer program is received. The computer program to be deployed on a computer system connected to a distributed peer-to-peer network. Computer systems in the network are referred to as nodes of a blockchain. The nodes are associated with corresponding databases storing copies of a distributed database record associated with the blockchain. Transactions executed over copies of the distributed database record are automatically replicated across the blockchain nodes. The deploy request includes metadata associated with the computer program. The metadata includes a property that associates a function of the computer program with a network protocol method. A mapping between the function of the program and the method is generated. When a request including the method is received, an invoke request including the function of the program and an endpoint, where the computer program is accessible, is automatically generated. The invoke request is sent to the endpoint.

Patent Agency Ranking