Determine payload integrity for traffic flowing across proxies

    公开(公告)号:US10742612B2

    公开(公告)日:2020-08-11

    申请号:US15784708

    申请日:2017-10-16

    Abstract: In a network that includes a client, a server and one or more proxy entities that intercept network traffic between the client and the server, a computer-implemented method is provided including: establishing trust with a permissioned distributed database; computing hashes from packet payloads of network traffic originated, intercepted or received; storing the hashes to the permissioned distributed database so that the permissioned distributed database maintains hashes computed from packets of the network traffic originated, intercepted or received by the client, server and the one or more proxy entities; and validating the hashes by comparing, with each other, the hashes stored to the permissioned distributed database by the client, server and the one or more proxy entities to determine whether any packet payload of the network traffic was modified in transit.

    Communication Paths for Distributed Ledger Systems

    公开(公告)号:US20180254982A1

    公开(公告)日:2018-09-06

    申请号:US15446992

    申请日:2017-03-01

    CPC classification number: H04L45/302 H04L47/726

    Abstract: Various implementations disclosed herein enable adjusting the performance of at least a portion of communication paths associated with a distributed ledger. In various implementations, a method includes determining a quality of service value for a data transmission over the communication paths provided by a first plurality of network nodes. In some implementations, the data transmission is associated with the distributed ledger. In various implementations, the method includes determining one or more configuration parameters for at least one of the first plurality of network nodes based on a function of the quality of service value. In various implementations, the method includes providing the one or more configuration parameters to the at least one of the first plurality of network nodes.

    Anomaly Detection in Distributed Ledger Systems

    公开(公告)号:US20180181751A1

    公开(公告)日:2018-06-28

    申请号:US15390488

    申请日:2016-12-24

    Abstract: In various implementations, a method of identifying anomalies is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes one or more processors, a non-transitory memory, and one or more network interfaces. In various implementations, the method includes determining a characteristic value based on information associated with the distributed ledger. In some implementations, the distributed ledger stores blocks of transactions that were added to the distributed ledger based on a consensus determination between the plurality of network nodes. In various implementations, the method includes determining whether a current transaction satisfies the characteristic value. In various implementations, the method include indicating whether there is an anomaly based on a function of the current transaction in relation to the characteristic value.

    Anomaly detection in distributed ledger systems

    公开(公告)号:US10311230B2

    公开(公告)日:2019-06-04

    申请号:US15390488

    申请日:2016-12-24

    Abstract: In various implementations, a method of identifying anomalies is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes one or more processors, a non-transitory memory, and one or more network interfaces. In various implementations, the method includes determining a characteristic value based on information associated with the distributed ledger. In some implementations, the distributed ledger stores blocks of transactions that were added to the distributed ledger based on a consensus determination between the plurality of network nodes. In various implementations, the method includes determining whether a current transaction satisfies the characteristic value. In various implementations, the method include indicating whether there is an anomaly based on a function of the current transaction in relation to the characteristic value.

    DETERMINE PAYLOAD INTEGRITY FOR TRAFFIC FLOWING ACROSS PROXIES

    公开(公告)号:US20190116158A1

    公开(公告)日:2019-04-18

    申请号:US15784708

    申请日:2017-10-16

    Abstract: In a network that includes a client, a server and one or more proxy entities that intercept network traffic between the client and the server, a computer-implemented method is provided including: establishing trust with a permissioned distributed database; computing hashes from packet payloads of network traffic originated, intercepted or received; storing the hashes to the permissioned distributed database so that the permissioned distributed database maintains hashes computed from packets of the network traffic originated, intercepted or received by the client, server and the one or more proxy entities; and validating the hashes by comparing, with each other, the hashes stored to the permissioned distributed database by the client, server and the one or more proxy entities to determine whether any packet payload of the network traffic was modified in transit.

    Transaction management in distributed ledger systems

    公开(公告)号:US10476682B2

    公开(公告)日:2019-11-12

    申请号:US15447001

    申请日:2017-03-01

    Abstract: In various implementations, a method of managing transactions in a distributed ledger is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes a processor, a non-transitory memory, and a network interface. In various implementations, the method includes synchronizing a first clock of the first network node with respective clocks maintained by one or more of the plurality of network nodes. In various implementations, the method includes obtaining a transaction indicator including respective transaction data. For example, in some implementations, the method includes receiving a transaction request from a client device. In various implementations, the method includes synthesizing, by the first network node, a timestamp for the transaction based on the first clock. In some implementations, the timestamp indicates a time that associates the first network node to the transaction.

    End-to-end policy management for a chain of administrative domains

    公开(公告)号:US10419446B2

    公开(公告)日:2019-09-17

    申请号:US15644982

    申请日:2017-07-10

    Abstract: Managing policies for a chain of administrative domains, from end-to-end, includes receiving, at a network device associated with an administrative domain that is part of a chain of administrative domains provisioning an Internet-based application or an Internet-based service to a network, a root block for a blockchain. The root block is generated by a network device in the network and includes a request for a specific network parameter over a specific time period. The network device associated with the administrative domain appends a first block to the blockchain including the root block to accept the request and configures the administrative domain in accordance with the specific network parameter when an end-to-end path in the chain of administrative domains accepts the request. The network device associated with the administrative domain also generates blockchain transactions that append network status updates to the blockchain during the specific time period.

    Transaction Management in Distributed Ledger Systems

    公开(公告)号:US20180254841A1

    公开(公告)日:2018-09-06

    申请号:US15447001

    申请日:2017-03-01

    Abstract: In various implementations, a method of managing transactions in a distributed ledger is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes a processor, a non-transitory memory, and a network interface. In various implementations, the method includes synchronizing a first clock of the first network node with respective clocks maintained by one or more of the plurality of network nodes. In various implementations, the method includes obtaining a transaction indicator including respective transaction data. For example, in some implementations, the method includes receiving a transaction request from a client device. In various implementations, the method includes synthesizing, by the first network node, a timestamp for the transaction based on the first clock. In some implementations, the timestamp indicates a time that associates the first network node to the transaction.

Patent Agency Ranking