-
公开(公告)号:US11301452B2
公开(公告)日:2022-04-12
申请号:US16155448
申请日:2018-10-09
Applicant: eBay, Inc.
Inventor: Michael Chan , Derek Chamorro , Arpit Jain , Venkata Siva Vijayendra Bhamidipati
Abstract: Disclosed is technology for storing original work data on a derivative work data blockchain along with code for verifying that derivative work data is derivative of the original work data. The technology involves receiving derivative work data from a submitting entity along with proof data showing that the derivative work is derivative of the original work. If the derivative work data is verified as derivative, then the derivative work data is appended to the derivative work data blockchain.
-
公开(公告)号:US20180204013A1
公开(公告)日:2018-07-19
申请号:US15410139
申请日:2017-01-19
Applicant: eBay Inc.
Inventor: Michael Chan , Nikhil Firke , Todd Ryan Palmer , Brian Peter Dickson , Julien Soriano , Ralph Forsythe
CPC classification number: G06F21/602 , G06F21/552 , G06F2221/2101 , G06F2221/2107 , G06Q20/12 , G06Q20/38215 , G06Q20/385 , G06Q20/4016 , H04L9/0822 , H04L9/3247
Abstract: A cryptographic tracking engine is disclosed that can track a user's data over the Internet in a way that allows the user to maintain control over the data downstream while maintaining the security of the stored data. An online entity provides an identifier that is encrypted using a first mechanism. Further, the user provides a data item for an electronic communication between two users. The data item is encrypted using the first mechanism. The data encrypted using the first mechanism is stored in a cryptographic entry. Other data for the electronic communication between the a first and second user is encrypted using a second encryption mechanism, such as a block cipher. The user can then selectively expose data stored in the cryptographic entry on a block-by-block basis to track exchanges of data over the Internet.
-
公开(公告)号:US10462298B2
公开(公告)日:2019-10-29
申请号:US15402899
申请日:2017-01-10
Applicant: eBay Inc.
Inventor: Nikhil Firke , Michael Chan , Ralph Forsythe , Brian Peter Dickson , Todd Ryan Palmer
Abstract: Techniques for managing electronic user profiles are presented herein. An example method includes accessing, from a data structure, a user profile. The user profile can include a profile identifier and a plurality of data fields. The method also includes displaying, on a display device, an interactive user interface. The user interface can include a plurality of user interface action elements. Each of the user interface action elements can be associated with a data field in the data structure. Each of the user interface action elements can also be individually selectable by a respective user action to transmit the associated data field to a remote device. In response to receiving a selection of a user interface action element, the method can further include transmitting the associated data field and the profile identifier to a router configured to send, based on the profile identifier, the associated data field to the remote device.
-
公开(公告)号:US11880352B2
公开(公告)日:2024-01-23
申请号:US17686876
申请日:2022-03-04
Applicant: eBay, Inc.
Inventor: Michael Chan , Derek Chamorro , Arpit Jain , Venkata Siva Vijayendra Bhamidipati
CPC classification number: G06F16/2365 , G06F16/2379 , H04L9/0637 , H04L9/50
Abstract: Disclosed is technology for storing original work data on a derivative work data blockchain along with code for verifying that derivative work data is derivative of the original work data. The technology involves receiving derivative work data from a submitting entity along with proof data showing that the derivative work is derivative of the original work. If the derivative work data is verified as derivative, then the derivative work data is appended to the derivative work data blockchain.
-
公开(公告)号:US11809551B2
公开(公告)日:2023-11-07
申请号:US17549027
申请日:2021-12-13
Applicant: EBAY INC.
Inventor: Venkata Siva Vijayendra Bhamidipati , Ashok Srinivasa Murthy , Derek Chamorro , Michael Chan , Arpit Jain
CPC classification number: G06F21/54 , G06Q20/3678 , G06Q20/405 , H04L9/0637
Abstract: Technologies are shown for function level permissions control for smart contract execution to implement permissions policy on a blockchain. Permissions control rules control function calls at a system level utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for a smart contract. The permissions control rules are applied to the call stack to implement permissions control policy. Permissions control rules can use dynamic state data in the function call chain. If the dynamic state data observed in function call chains does not meet the requirements defined in the permissions control rules, then the function call can be blocked from executing or completing execution. The permissions control rules can be generated for a variety of different entities, such as a domain, user or resource.
-
公开(公告)号:US10986229B2
公开(公告)日:2021-04-20
申请号:US16560506
申请日:2019-09-04
Applicant: eBay Inc.
Inventor: Nikhil Firke , Michael Chan , Ralph Forsythe , Brian Peter Dickson , Todd Ryan Palmer
Abstract: Techniques for managing electronic user profiles are presented herein. An example method includes accessing, from a data structure, a user profile. The user profile can include a profile identifier and a plurality of data fields. The method also includes displaying, on a display device, an interactive user interface. The user interface can include a plurality of user interface action elements. Each of the user interface action elements can be associated with a data field in the data structure. Each of the user interface action elements can also be individually selectable by a respective user action to transmit the associated data field to a remote device. In response to receiving a selection of a user interface action element, the method can further include transmitting the associated data field and the profile identifier to a router configured to send, based on the profile identifier, the associated data field to the remote device.
-
公开(公告)号:US11899783B2
公开(公告)日:2024-02-13
申请号:US17571371
申请日:2022-01-07
Applicant: EBAY INC.
Inventor: Venkata Siva Vijayendra Bhamidipati , Michael Chan , Derek Chamorro , Arpit Jain , Ashok Srinivasa Murthy
CPC classification number: G06F21/54 , G06Q20/3678 , G06Q20/405 , H04L9/0637
Abstract: Technologies are shown for system level function based access control for smart contract execution on a blockchain. Access control rules control function calls at a system level by utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for execution of a smart contract. The access control rules are applied to the function call stack to allow or prohibit specific functions or function call chains. Access control rules can also define allowed or prohibited parameter data in the function call chain. If the function call chain or parameters do not meet the requirements defined in the access control rules, then the function call can be blocked from executing or completing execution. The access control rules can produce sophisticated access control policies based on complex function call chains.
-
公开(公告)号:US11676135B2
公开(公告)日:2023-06-13
申请号:US16742726
申请日:2020-01-14
Applicant: eBay inc.
Inventor: Venkata Siva Vijayendra Bhamidipati , Derek Chamorro , Michael Chan , Arpit Jain , Ashok Srinivasa Murthy , Anirudh Kamalapuram Muralidhar
CPC classification number: G06Q20/382 , G06F9/5005 , G06N5/04
Abstract: Technologies are shown for selecting a provider to service a client service request using a predictive metrics based consensus protocol to select a provider and create a service request transaction block to service the client service request. A client service request is received and forwarded to a set of providers. Proposed transactions are received from the providers and scored based on a predictive metric. A proposal transaction is selected based on the scoring and the selected transaction is written as a block on a service transaction blockchain. The provider for the selected transaction detects the block on the blockchain and performs the requested service. The client detects the block on the blockchain and transfers payment to the provider. Selection can be based on predictive metrics in the providers or macro metrics determined in miner nodes in combination with provider reputation, currency, load sharing, fairness, provisioning, and static and dynamic criteria.
-
公开(公告)号:US20220224796A1
公开(公告)日:2022-07-14
申请号:US17706849
申请日:2022-03-29
Applicant: eBay Inc.
Inventor: Nikhil Firke , Michael Chan , Ralph Forsythe , Brian Peter Dickson , Todd Ryan Palmer
IPC: H04M3/51 , G06Q30/00 , H04L67/306 , G06Q10/10 , G06Q30/02 , H04M1/72403
Abstract: Techniques for managing electronic user profiles are presented herein. An example method includes accessing, from a data structure, a user profile. The user profile can include a profile identifier and a plurality of data fields. The method also includes displaying, on a display device, an interactive user interface. The user interface can include a plurality of user interface action elements. Each of the user interface action elements can be associated with a data field in the data structure. Each of the user interface action elements can also be individually selectable by a respective user action to transmit the associated data field to a remote device. In response to receiving a selection of a user interface action element, the method can further include transmitting the associated data field and the profile identifier to a router configured to send, based on the profile identifier, the associated data field to the remote device.
-
公开(公告)号:US11263315B2
公开(公告)日:2022-03-01
申请号:US16429656
申请日:2019-06-03
Applicant: eBay Inc.
Inventor: Venkata Siva Vijayendra Bhamidipati , Michael Chan , Derek Chamorro , Arpit Jain , Ashok Srinivasa Murthy
Abstract: Technologies are shown for system level function based access control for smart contract execution on a blockchain. Access control rules control function calls at a system level by utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for execution of a smart contract. The access control rules are applied to the function call stack to allow or prohibit specific functions or function call chains. Access control rules can also define allowed or prohibited parameter data in the function call chain. If the function call chain or parameters do not meet the requirements defined in the access control rules, then the function call can be blocked from executing or completing execution. The access control rules can produce sophisticated access control policies based on complex function call chains.
-
-
-
-
-
-
-
-
-