-
公开(公告)号:US20180285585A1
公开(公告)日:2018-10-04
申请号:US15939650
申请日:2018-03-29
发明人: Joshua DANIEL , Xiaofeng DU , Gery DUCATEL
摘要: A computer implemented method for access control for a restricted resource in a computer system is disclosed. A related computer system is also disclosed.
-
公开(公告)号:US20170286136A1
公开(公告)日:2017-10-05
申请号:US15508190
申请日:2015-08-27
发明人: Theo DIMITRAKOS , Joshua DANIEL , Fadi EL-MOUSSA , Gery DUCATEL
IPC分类号: G06F9/445
CPC分类号: G06F9/44505 , G06F8/61
摘要: A computer implemented method to provide a software feature in a registry of software components for a first network attached computing environment, each software component in the registry having associated deployment information to assemble a software application to be executed by the first environment as a set of software components, and the software feature being provided in part by a second network attached computing environment external to the first environment, the method comprising: for a selected software component in the registry, determining compatibility of the software feature with the software component; and responsive to the determination, adapting a registry entry of the software component in the registry to indicate the availability of the software feature for the software component.
-
公开(公告)号:US20170286083A1
公开(公告)日:2017-10-05
申请号:US15508209
申请日:2015-08-27
发明人: Theo DIMITRAKOS , Joshua DANIEL , Fadi EL-MOUSSA , Gery DUCATEL
CPC分类号: G06F8/61 , G06F9/44505 , G06F9/45508 , H04L67/34
摘要: A computer implemented method to execute a software application in a first network attached computing environment comprising: receiving a definition of the application, the definition identifying a set of software components and including configuration information for installing and executing the components in the first environment; installing and configuring the components in the first environment in accordance with the definition, wherein the definition further includes, for an identified component in the set, software agent information about a software agent that implements part of a software feature, the agent being provided by a second network attached computing environment external to and communicatively connected with the first environment, the second environment providing another part of the software feature, the method further comprising obtaining, installing and configuring the agent based on the agent information to provide part of the software feature for the application.
-
公开(公告)号:US20200295941A1
公开(公告)日:2020-09-17
申请号:US16086074
申请日:2017-03-03
摘要: A computer implemented method for code distribution by a base station to a target device via a network, the distribution being made via one or more distribution servers arranged between the base station and the target device on the network, is disclosed.
-
公开(公告)号:US20180225611A1
公开(公告)日:2018-08-09
申请号:US15749391
申请日:2016-07-20
发明人: Joshua DANIEL , Gery DUCATEL , Theo DIMITRAKOS
CPC分类号: G06Q10/06315 , G06F16/27 , G06F21/6236 , G06Q20/065
摘要: A computer implemented method to provide allocation of one or more computing resources for a consumer computing component, each resource having a resource type and being provided by one or more resource providers, and the consumer having associated a quantity of tradeable value constraining an extent of resource consumption.
-
公开(公告)号:US20190273781A1
公开(公告)日:2019-09-05
申请号:US16292683
申请日:2019-03-05
发明人: Joshua DANIEL , Gery DUCATEL
IPC分类号: H04L29/08 , H04L29/06 , G06F16/14 , G06F16/182 , G06F16/9538 , H04L9/06
摘要: A computer implemented method of a network connected data storage system, the method including receiving, via the network, and storing a data set including a plurality of data items encrypted using an index-based searchable encryption scheme, wherein the searchable encryption scheme has associated a server index and a client index; receiving, via the network, and storing a set of hashed information for each of a plurality of queries of the data set, each item of hashed information including a hash of a query and a hash of an expected result of executing the query using the server index; receiving, via the network, a query from a data requester to retrieve a set of data items from the data store and a hash of an expected result of executing the received query using the server index; generating a result of the received query for the data set based on the server index; and responsive to a comparison of a hash of the generated result, the received hash of the expected result, and the hashes of expected results in the set of hashed information, granting access for the requester to the data set.
-
公开(公告)号:US20180225469A1
公开(公告)日:2018-08-09
申请号:US15749338
申请日:2016-07-20
发明人: Joshua DANIEL , Gery DUCATEL , Theo DIMITRAKOS
CPC分类号: G06F21/629 , G06F21/10 , G06F21/602 , G06F21/62 , G06F2221/2141 , G06Q20/3678 , G06Q20/401 , H04L9/0637 , H04L63/10
摘要: A computer implemented method of a resource provider for access control for a restricted resource in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components including a provider record associated with the resource provider, the method including: identifying an access control role definition for access to the resource, the role including a specification of access permissions; receiving a request from a resource consumer for access to the resource; communicating, to the resource consumer, an indication of a quantity of a cryptocurrency required for access to the resource; and in response to a determination that the required quantity of cryptocurrency is transferred to the provider record in the blockchain, the transfer being caused by a blockchain transaction including an identification of the role and the transaction being validated by a miner component, granting the consumer access to the resource in accordance with the role definition.
-
公开(公告)号:US20180025166A1
公开(公告)日:2018-01-25
申请号:US15548654
申请日:2016-02-10
发明人: Joshua DANIEL , Theo DIMITRAKOS , Gery DUCATEL
CPC分类号: G06F21/602 , G06F9/5011 , G06Q10/06
摘要: A computer implemented method for validating use of a computing resource by a requester software component including: validating a characteristic of the requester; generating a first transaction defining criteria for consumption of the resource by the requester, the first transaction being encrypted with a private key from a public key/private key pair and being added as part of a block of transactions to a blockchain data structure; generating a subsequent encrypted transaction corresponding to a request of the requester to consume the resource, the subsequent transaction referring to the first transaction, wherein the subsequent transaction is validated by a transaction miner computing component from a plurality of miners by authenticating the transaction using the public key and verifying compliance with the criteria defined in each transaction.
-
公开(公告)号:US20220376902A1
公开(公告)日:2022-11-24
申请号:US17753774
申请日:2020-09-11
发明人: Ali SAJJAD , Gery DUCATEL , Gabriele GELARDI
IPC分类号: H04L9/08
摘要: There is provided a computer implemented method for accessing a resource at a computing device, as well as for controlling access to a resource by a computing device. The computing device receives a policy indicating a set of conditions under which access to the resource is permitted, determines whether each of the conditions are initially present based on an output of one or more sensors of the device, and monitors the one or more sensors to detect a change in the presence of one or more of the conditions. In response to detecting the change in the presence of one or more of the conditions, the computing device determines whether each of the conditions are present. In response to determining that each of the conditions is present, access to the resource is enabled. If at least one of the conditions is not present, access to the resource is prevented.
-
公开(公告)号:US20220261466A1
公开(公告)日:2022-08-18
申请号:US17597629
申请日:2020-06-16
发明人: Gabriele GELARDI , Ali Sajjad , Gery DUCATEL
摘要: Computer implemented methods for enrolling a user as an authenticated user of a computing device and for authenticating a user of a computing device are provided. The methods make use of behavioral biometrics to determine a set of shares that represent a secret credential according to a secret sharing scheme. The set of shares is initially determined when the user is enrolled based on typical measurements of the user's behavioral biometrics and authentication data indicating how to generate the set of shares from a user's behavioral biometrics is generated. When authenticating the user, the computing device can generate the set of shares based on the authentication data and measurements of the current user's behavioral biometrics. The computing device can use the generated set of shares to recreate a copy of the secret credential with which to authenticate the user.
-
-
-
-
-
-
-
-
-