Cryptologic blockchain interoperation

    公开(公告)号:US10250395B1

    公开(公告)日:2019-04-02

    申请号:US16116360

    申请日:2018-08-29

    IPC分类号: H04L9/32 H04L9/14 H04L9/08

    摘要: Systems and methods for cryptologic blockchain interoperability are provided. A furnisher participant of a furnisher DLT network may receive a request to export or share token data stored on a furnisher blockchain that stores the token data based on a furnisher DLT. The furnisher participant may transmit, to a plurality of validator participants of the furnisher DLT network, a consensus request to certify the token data is stored on a furnisher blockchain. The furnisher participant may receive certifications that the token data is stored on the furnisher blockchain. The certifications may include digital signatures respectively signed by the validator participants. The furnisher participant may generate a multi-signature certification message. The furnisher participant may communicate the multi-signature certification message to the data receiver. The data receiver may verify the digital signatures based on public keys of the validator participants of the furnisher DLT network.

    Antivirus signature distribution with distributed ledger

    公开(公告)号:US10063572B2

    公开(公告)日:2018-08-28

    申请号:US15082895

    申请日:2016-03-28

    IPC分类号: G06F21/56 H04L29/06

    摘要: This document generally describes techniques for using a distributed ledger to implement a framework for the validation and distribution of virus signatures, which may be used by antivirus engines on computing devices to detect and remove malware. Some implementations can include accessing, by a computing system, data that identifies a plurality of virus signatures. A signature score associated with a first virus signature can be identified that is determined based on a number of signature authorities that have submitted or endorsed the first virus signature. The computing system may determine whether the first virus signature is valid based on whether the signature score satisfies a threshold score. In response to determining that the first virus signature is valid, the first virus signature can be used by the computing system to perform virus scans of one or more files maintained by the computing system.