PROTECTING COMPUTER SYSTEMS USING MERKLE TREES AS PROOF OF-WORK

    公开(公告)号:US20190273619A1

    公开(公告)日:2019-09-05

    申请号:US16410859

    申请日:2019-05-13

    Abstract: A proof-of-work system where a first party (e.g., a client computer system) may request access to a computing resource. A second party (e.g., a service provider) may determine a challenge that may be provided to the first party. A valid solution to the challenge may be generated and provided for the request to be fulfilled. The challenge may include a message and a seed, such that the seed may be used at least in part to cryptographically derive information that may be used to generate a solution to the challenge. A hash tree may be generated as of generating the solution.

    Composable machine image
    102.
    发明授权

    公开(公告)号:US10338946B1

    公开(公告)日:2019-07-02

    申请号:US15862523

    申请日:2018-01-04

    Abstract: A computer system image is executed on a computing node over a network. A system specification file transmitted over the network specifies the computer system image by specifying components of the computer system image. The components include an operating system and at least one resource. The system specification file also contains a signature associated with the resource. A resource is determined to be authorized to be incorporated into the computer system image by verifying the signature. A computer system image can then be formed based on the components specified by the system specification file and executed locally.

    Adaptive client-aware session security

    公开(公告)号:US10313364B2

    公开(公告)日:2019-06-04

    申请号:US15048823

    申请日:2016-02-19

    Abstract: Source information for requests submitted to a system are classified to enable differential handling of requests over a session whose source information changes over the session. For source information (e.g., an IP address) classified as fixed, stronger authentication may be required to fulfill requests when the source information changes during the session. Similarly, for source information classified as dynamic, source information may be allowed to change without requiring the stronger authentication.

    Secure information flow
    105.
    发明授权

    公开(公告)号:US10242174B2

    公开(公告)日:2019-03-26

    申请号:US14617691

    申请日:2015-02-09

    Abstract: Secure information flow may include a service receiving a request for data from a caller. The service may respond to the request with the requested data via a secure flow container. The secure flow container may then send the information to the caller component. Before the secure flow container receives or sends the information, a monitoring environment may permit the secure flow container to receive or send the information, respectively.

    Signature delegation
    106.
    发明授权

    公开(公告)号:US10218511B2

    公开(公告)日:2019-02-26

    申请号:US15390176

    申请日:2016-12-23

    Abstract: A signature authority generates a master seed value that is used as the root of a seed tree of subordinate nodes. Each subordinate node of the seed tree is generated from the value of its parent node using a cryptographic hash or one-way function. The signature authority selects subordinate seed values which are distributed to one or more key generators, each of which generates a set of one-time-use cryptographic keys. Each key generator generates a hash tree from its set of one-time-use cryptographic keys, and the root of its hash tree is returned to the signature authority. The signature authority integrates the hashes provided by the key generators into a comprehensive hash tree. The root of the comprehensive hash tree acts as a public key for the signature authority.

    ENCODING OF SECURITY CODES
    107.
    发明申请

    公开(公告)号:US20180314820A1

    公开(公告)日:2018-11-01

    申请号:US16029469

    申请日:2018-07-06

    CPC classification number: G06F21/45 G06F21/46

    Abstract: A method and apparatus for encoding security codes are provided. In the method and apparatus a first code, which may be an erroneous code, is compared to a set of codes to identify a code portion. The code portion may be identified as contributing to inducing erroneous entry of the first code. The likelihood associated with issuing a second code including the code portion may be updated to negatively bias issuing the second code.

    RESPONSE RATE LIMITING DEVICE
    110.
    发明申请

    公开(公告)号:US20180034710A1

    公开(公告)日:2018-02-01

    申请号:US15725671

    申请日:2017-10-05

    CPC classification number: H04L41/0896 H04L63/1425 H04L63/1458

    Abstract: A response rate limiting device is provided that may reduce the volume of network traffic generated as a result of an amplification attack. The rate liming device receives a packet and determines identification information corresponding to the packet. The rate limiting device receives a second packet bound for a network destination. Based at least in part on the size of the first packet and the size of the second packet, the rate limiting device determines a transmission rate for the second packet. The second packet is transmitted to the network destination in accordance with the determined transfer rate.

Patent Agency Ranking