EXTERNAL FEATURE PROVISION FOR A CLOUD APPLICATION REGISTRY

    公开(公告)号:US20170286136A1

    公开(公告)日:2017-10-05

    申请号:US15508190

    申请日:2015-08-27

    IPC分类号: G06F9/445

    CPC分类号: G06F9/44505 G06F8/61

    摘要: A computer implemented method to provide a software feature in a registry of software components for a first network attached computing environment, each software component in the registry having associated deployment information to assemble a software application to be executed by the first environment as a set of software components, and the software feature being provided in part by a second network attached computing environment external to the first environment, the method comprising: for a selected software component in the registry, determining compatibility of the software feature with the software component; and responsive to the determination, adapting a registry entry of the software component in the registry to indicate the availability of the software feature for the software component.

    EXTERNAL FEATURE PROVISION FOR CLOUD APPLICATIONS

    公开(公告)号:US20170286083A1

    公开(公告)日:2017-10-05

    申请号:US15508209

    申请日:2015-08-27

    IPC分类号: G06F9/445 G06F9/455 H04L29/08

    摘要: A computer implemented method to execute a software application in a first network attached computing environment comprising: receiving a definition of the application, the definition identifying a set of software components and including configuration information for installing and executing the components in the first environment; installing and configuring the components in the first environment in accordance with the definition, wherein the definition further includes, for an identified component in the set, software agent information about a software agent that implements part of a software feature, the agent being provided by a second network attached computing environment external to and communicatively connected with the first environment, the second environment providing another part of the software feature, the method further comprising obtaining, installing and configuring the agent based on the agent information to provide part of the software feature for the application.

    DATA ACESS AUTHENICATION
    6.
    发明申请

    公开(公告)号:US20190273781A1

    公开(公告)日:2019-09-05

    申请号:US16292683

    申请日:2019-03-05

    摘要: A computer implemented method of a network connected data storage system, the method including receiving, via the network, and storing a data set including a plurality of data items encrypted using an index-based searchable encryption scheme, wherein the searchable encryption scheme has associated a server index and a client index; receiving, via the network, and storing a set of hashed information for each of a plurality of queries of the data set, each item of hashed information including a hash of a query and a hash of an expected result of executing the query using the server index; receiving, via the network, a query from a data requester to retrieve a set of data items from the data store and a hash of an expected result of executing the received query using the server index; generating a result of the received query for the data set based on the server index; and responsive to a comparison of a hash of the generated result, the received hash of the expected result, and the hashes of expected results in the set of hashed information, granting access for the requester to the data set.

    EXPENDABLE ACCESS CONTROL
    7.
    发明申请

    公开(公告)号:US20180225469A1

    公开(公告)日:2018-08-09

    申请号:US15749338

    申请日:2016-07-20

    摘要: A computer implemented method of a resource provider for access control for a restricted resource in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components including a provider record associated with the resource provider, the method including: identifying an access control role definition for access to the resource, the role including a specification of access permissions; receiving a request from a resource consumer for access to the resource; communicating, to the resource consumer, an indication of a quantity of a cryptocurrency required for access to the resource; and in response to a determination that the required quantity of cryptocurrency is transferred to the provider record in the blockchain, the transfer being caused by a blockchain transaction including an identification of the role and the transaction being validated by a miner component, granting the consumer access to the resource in accordance with the role definition.

    VALIDATING COMPUTER RESOURCE USAGE
    8.
    发明申请

    公开(公告)号:US20180025166A1

    公开(公告)日:2018-01-25

    申请号:US15548654

    申请日:2016-02-10

    IPC分类号: G06F21/60 G06F9/50

    摘要: A computer implemented method for validating use of a computing resource by a requester software component including: validating a characteristic of the requester; generating a first transaction defining criteria for consumption of the resource by the requester, the first transaction being encrypted with a private key from a public key/private key pair and being added as part of a block of transactions to a blockchain data structure; generating a subsequent encrypted transaction corresponding to a request of the requester to consume the resource, the subsequent transaction referring to the first transaction, wherein the subsequent transaction is validated by a transaction miner computing component from a plurality of miners by authenticating the transaction using the public key and verifying compliance with the criteria defined in each transaction.

    RESOURCE ACCESS CONTROL
    9.
    发明申请

    公开(公告)号:US20220376902A1

    公开(公告)日:2022-11-24

    申请号:US17753774

    申请日:2020-09-11

    IPC分类号: H04L9/08

    摘要: There is provided a computer implemented method for accessing a resource at a computing device, as well as for controlling access to a resource by a computing device. The computing device receives a policy indicating a set of conditions under which access to the resource is permitted, determines whether each of the conditions are initially present based on an output of one or more sensors of the device, and monitors the one or more sensors to detect a change in the presence of one or more of the conditions. In response to detecting the change in the presence of one or more of the conditions, the computing device determines whether each of the conditions are present. In response to determining that each of the conditions is present, access to the resource is enabled. If at least one of the conditions is not present, access to the resource is prevented.

    USER AUTHENTICATION BASED ON BEHAVIORAL BIOMETRICS

    公开(公告)号:US20220261466A1

    公开(公告)日:2022-08-18

    申请号:US17597629

    申请日:2020-06-16

    IPC分类号: G06F21/32 G06F21/31

    摘要: Computer implemented methods for enrolling a user as an authenticated user of a computing device and for authenticating a user of a computing device are provided. The methods make use of behavioral biometrics to determine a set of shares that represent a secret credential according to a secret sharing scheme. The set of shares is initially determined when the user is enrolled based on typical measurements of the user's behavioral biometrics and authentication data indicating how to generate the set of shares from a user's behavioral biometrics is generated. When authenticating the user, the computing device can generate the set of shares based on the authentication data and measurements of the current user's behavioral biometrics. The computing device can use the generated set of shares to recreate a copy of the secret credential with which to authenticate the user.