-
公开(公告)号:US11250125B2
公开(公告)日:2022-02-15
申请号:US16698210
申请日:2019-11-27
Applicant: eBay Inc.
Inventor: Venkata Siva Vijayendra Bhamidipati , Ashok Srinivasa Murthy , Derek Chamorro , Michael Chan , Arpit Jain
Abstract: Technologies are shown for function level permissions control for smart contract execution to implement permissions policy on a blockchain. Permissions control rules control function calls at a system level utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for a smart contract. The permissions control rules are applied to the call stack to implement permissions control policy. Permissions control rules can use dynamic state data in the function call chain. If the dynamic state data observed in function call chains does not meet the requirements defined in the permissions control rules, then the function call can be blocked from executing or completing execution. The permissions control rules can be generated for a variety of different entities, such as a domain, user or resource.
-
公开(公告)号:US11188384B2
公开(公告)日:2021-11-30
申请号:US16384362
申请日:2019-04-15
Applicant: eBay Inc.
Inventor: Michael Chan , Derek Chamorro , Venkata Siva Vijayendra Bhamidipati , Arpit Jain
Abstract: Technologies are shown for storing component state data for a resource on a blockchain involving generating a resource data block that corresponds to a resource that includes links that correspond to components of the resource, generating a first component state data block for a component of the resource on a blockchain that includes first state data for the first component, and setting the link for the component to reference the first component state data block. Subsequently, a second component state data block can be generated for the component with second state data and the second component state data block linked to the first component state data block.
-
公开(公告)号:US20180198914A1
公开(公告)日:2018-07-12
申请号:US15402899
申请日:2017-01-10
Applicant: eBay Inc.
Inventor: Nikhil Firke , Michael Chan , Ralph Forsythe , Brian Peter Dickson , Todd Ryan Palmer
Abstract: Techniques for managing electronic user profiles are presented herein. An example method includes accessing, from a data structure, a user profile. The user profile can include a profile identifier and a plurality of data fields. The method also includes displaying, on a display device, an interactive user interface. The user interface can include a plurality of user interface action elements. Each of the user interface action elements can be associated with a data field in the data structure. Each of the user interface action elements can also be individually selectable by a respective user action to transmit the associated data field to a remote device. In response to receiving a selection of a user interface action element, the method can further include transmitting the associated data field and the profile identifier to a router configured to send, based on the profile identifier, the associated data field to the remote device.
-
公开(公告)号:US12267459B2
公开(公告)日:2025-04-01
申请号:US17706849
申请日:2022-03-29
Applicant: eBay Inc.
Inventor: Nikhil Firke , Michael Chan , Ralph Forsythe , Brian Peter Dickson , Todd Ryan Palmer
IPC: H04M3/00 , G06Q10/10 , G06Q30/016 , G06Q30/02 , H04L67/306 , H04M1/72403 , H04M3/51
Abstract: Techniques for managing electronic user profiles are presented herein. An example method includes accessing, from a data structure, a user profile. The user profile can include a profile identifier and a plurality of data fields. The method also includes displaying, on a display device, an interactive user interface. The user interface can include a plurality of user interface action elements. Each of the user interface action elements can be associated with a data field in the data structure. Each of the user interface action elements can also be individually selectable by a respective user action to transmit the associated data field to a remote device. In response to receiving a selection of a user interface action element, the method can further include transmitting the associated data field and the profile identifier to a router configured to send, based on the profile identifier, the associated data field to the remote device.
-
公开(公告)号:US11888966B2
公开(公告)日:2024-01-30
申请号:US17850269
申请日:2022-06-27
Applicant: eBay Inc.
Inventor: Venkata Siva Vijayendra Bhamidipati , Michael Chan , Derek Chamorro , Arpit Jain , Ashok Srinivasa Murthy
CPC classification number: H04L9/0637 , G06Q20/367 , H04L9/3247 , H04L41/22 , H04L63/0227 , H04L63/1425 , H04L63/1433
Abstract: Technologies are shown for HGM based control for smart contract execution. HGM control rules control function calls at a system level utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for a smart contract. The HGM control rules are applied to HGMs collected from the call stack to allow or prohibit specific HGMs observed in functions or function call chains. HGM control rules can use dynamic state data in the function call chain. If the dynamic state data observed in function call chains does not meet the requirements defined in the HGM control rules, then the function call can be blocked from executing or completing execution. The HGM control rules can be generated by executing known sets of acceptable or vulnerable smart contracts and collecting the resulting HGMs.
-
公开(公告)号:US11681551B2
公开(公告)日:2023-06-20
申请号:US17499649
申请日:2021-10-12
Applicant: EBAY INC.
Inventor: Michael Chan , Derek Chamorro , Venkata Siva Vijayendra Bhamidipati , Arpit Jain
CPC classification number: G06F9/50 , G06F8/65 , G06F16/1805 , H04L9/0643 , H04L9/50
Abstract: Technologies are shown for storing sub-component state data for a resource on a blockchain involving generating a resource data block that corresponds to a resource that includes links that correspond to sub-components of the resource, generating a first sub-component state data block for a sub-component of the resource on a blockchain that includes first state data for the first sub-component, and setting the link for the sub-component to reference the first sub-component state data block. Subsequently, a second sub-component state data block can be generated for the sub-component with second state data and the second sub-component state data block linked to the first sub-component state data block.
-
公开(公告)号:US20210127009A1
公开(公告)日:2021-04-29
申请号:US17141613
申请日:2021-01-05
Applicant: eBay Inc.
Inventor: Nikhil Firke , Michael Chan , Ralph Forsythe , Brian Peter Dickson , Todd Ryan Palmer
Abstract: Techniques for managing electronic user profiles are presented herein. An example method includes accessing, from a data structure, a user profile. The user profile can include a profile identifier and a plurality of data fields. The method also includes displaying, on a display device, an interactive user interface. The user interface can include a plurality of user interface action elements. Each of the user interface action elements can be associated with a data field in the data structure. Each of the user interface action elements can also be individually selectable by a respective user action to transmit the associated data field to a remote device. In response to receiving a selection of a user interface action element, the method can further include transmitting the associated data field and the profile identifier to a router configured to send, based on the profile identifier, the associated data field to the remote device.
-
公开(公告)号:US10798129B2
公开(公告)日:2020-10-06
申请号:US15700792
申请日:2017-09-11
Applicant: eBay Inc.
Inventor: Nikhil Firke , Michael Chan , Ralph Forsythe , Brian Peter Dickson , Akhila Nama , Nigel Campbell , Sahil Chadha
IPC: H04L29/06
Abstract: Multiuse certificates (e.g., wildcard certificates) can be associated with policies that specify one or more computational constraints, e.g., limited processor power, limited access time, limited access to file system usage, or limited memory access. An application associated with a multiuse certificate can be monitored to ensure that the specified computational constraints are not violated. Upon the computational constraints being violated, the multiuse certificate can be invalidated and/or authentication requests rejected.
-
公开(公告)号:US20190394334A1
公开(公告)日:2019-12-26
申请号:US16560506
申请日:2019-09-04
Applicant: eBay Inc.
Inventor: Nikhil Firke , Michael Chan , Ralph Forsythe , Brian Peter Dickson , Todd Ryan Palmer
Abstract: Techniques for managing electronic user profiles are presented herein. An example method includes accessing, from a data structure, a user profile. The user profile can include a profile identifier and a plurality of data fields. The method also includes displaying, on a display device, an interactive user interface. The user interface can include a plurality of user interface action elements. Each of the user interface action elements can be associated with a data field in the data structure. Each of the user interface action elements can also be individually selectable by a respective user action to transmit the associated data field to a remote device. In response to receiving a selection of a user interface action element, the method can further include transmitting the associated data field and the profile identifier to a router configured to send, based on the profile identifier, the associated data field to the remote device.
-
公开(公告)号:US20190014151A1
公开(公告)日:2019-01-10
申请号:US15700792
申请日:2017-09-11
Applicant: eBay Inc.
Inventor: Nikhil Firke , Michael Chan , Ralph Forsythe , Brian Peter Dickson , Akhila Nama , Nigel Campbell , Sahil Chadha
IPC: H04L29/06
Abstract: Multiuse certificates (e.g., wildcard certificates) can be associated with policies that specify one or more computational constraints, e.g., limited processor power, limited access time, limited access to file system usage, or limited memory access. An application associated with a multiuse certificate can be monitored to ensure that the specified computational constraints are not violated. Upon the computational constraints being violated, the multiuse certificate can be invalidated and/or authentication requests rejected.
-
-
-
-
-
-
-
-
-