HIGHLY SCALABLE PERMISSIONED BLOCK CHAINS

    公开(公告)号:US20220100846A1

    公开(公告)日:2022-03-31

    申请号:US17549027

    申请日:2021-12-13

    Applicant: EBAY INC.

    Abstract: Technologies are shown for function level permissions control for smart contract execution to implement permissions policy on a blockchain. Permissions control rules control function calls at a system level utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for a smart contract. The permissions control rules are applied to the call stack to implement permissions control policy. Permissions control rules can use dynamic state data in the function call chain. If the dynamic state data observed in function call chains does not meet the requirements defined in the permissions control rules, then the function call can be blocked from executing or completing execution. The permissions control rules can be generated for a variety of different entities, such as a domain, user or resource.

    BLOCKCHAIN CONSENSUS PROTOCOL USING PREDICTIVE PROOF OF METRICS

    公开(公告)号:US20210019740A1

    公开(公告)日:2021-01-21

    申请号:US16742726

    申请日:2020-01-14

    Applicant: eBay Inc.

    Abstract: Technologies are shown for selecting a provider to service a client service request using a predictive metrics based consensus protocol to select a provider and create a service request transaction block to service the client service request. A client service request is received and forwarded to a set of providers. Proposed transactions are received from the providers and scored based on a predictive metric. A proposal transaction is selected based on the scoring and the selected transaction is written as a block on a service transaction blockchain. The provider for the selected transaction detects the block on the blockchain and performs the requested service. The client detects the block on the blockchain and transfers payment to the provider. Selection can be based on predictive metrics in the providers or macro metrics determined in miner nodes in combination with provider reputation, currency, load sharing, fairness, provisioning, and static and dynamic criteria.

    ADAPTIVE SECURITY FOR SMART CONTRACTS USING HIGH GRANULARITY METRICS

    公开(公告)号:US20200177372A1

    公开(公告)日:2020-06-04

    申请号:US16656892

    申请日:2019-10-18

    Applicant: eBay Inc.

    Abstract: Technologies are shown for HGM based control for smart contract execution. HGM control rules control function calls at a system level utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for a smart contract. The HGM control rules are applied to HGMs collected from the call stack to allow or prohibit specific HGMs observed in functions or function call chains. HGM control rules can use dynamic state data in the function call chain. If the dynamic state data observed in function call chains does not meet the requirements defined in the HGM control rules, then the function call can be blocked from executing or completing execution. The HGM control rules can be generated by executing known sets of acceptable or vulnerable smart contracts and collecting the resulting HGMs.

    HIGHLY SCALABLE PERMISSIONED BLOCK CHAINS
    14.
    发明申请

    公开(公告)号:US20200175156A1

    公开(公告)日:2020-06-04

    申请号:US16698210

    申请日:2019-11-27

    Applicant: eBay Inc.

    Abstract: Technologies are shown for function level permissions control for smart contract execution to implement permissions policy on a blockchain. Permissions control rules control function calls at a system level utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for a smart contract. The permissions control rules are applied to the call stack to implement permissions control policy. Permissions control rules can use dynamic state data in the function call chain. If the dynamic state data observed in function call chains does not meet the requirements defined in the permissions control rules, then the function call can be blocked from executing or completing execution. The permissions control rules can be generated for a variety of different entities, such as a domain, user or resource.

Patent Agency Ranking