RECOVERING PUBLIC KEYS
    2.
    发明申请

    公开(公告)号:US20220385465A1

    公开(公告)日:2022-12-01

    申请号:US17755910

    申请日:2019-12-12

    Abstract: In an example, a method includes receiving a signed message generated by a computing device associated with a private key and a public key. The signed message includes an input message signed with the private key. The method further includes generating, using processing circuitry, a candidate public key based on the input message and the signed message using a public key recovery procedure. The method further includes determining the public key associated with the computing device based on an indication as to whether or not the candidate public key corresponds to the public key associated with the computing device.

    ACCESS CONTROL METHOD
    4.
    发明申请

    公开(公告)号:US20220083936A1

    公开(公告)日:2022-03-17

    申请号:US17420067

    申请日:2019-01-09

    Abstract: In an example, there is provided a method for creating a workflow, comprising workflow tasks. The method comprises assigning workflow tasks to workers, according to an access control policy. The method comprises encoding as a transaction to a secure ledger that access to the workflow is granted to a worker to perform a workflow task and enforcing access control on execution of the workflow task according to the transaction encoded to the secure ledger.

    EXECUTING PROCESSES IN SEQUENCE
    5.
    发明申请

    公开(公告)号:US20200034540A1

    公开(公告)日:2020-01-30

    申请号:US16470283

    申请日:2017-04-18

    Abstract: In an example, a machine-readable medium includes instructions that, when executed by a processor, cause the processor to order, as part of an execution of a trusted process, a plurality of processes into a sequence comprising a first process, at least one intermediate process, and a last process. The machine-readable medium may further comprise instruction to cause the processor to generate, as part of an execution of the first process, a value based on a code portion of the process following the first process in the sequence, and to generate, as part of an execution of each intermediate process, a respective value based on the value generated by the process preceding the intermediate process in the sequence and based on a code portion associated with the process following the intermediate process in the sequence.

    Ransomware attack monitoring
    6.
    发明授权

    公开(公告)号:US11586730B2

    公开(公告)日:2023-02-21

    申请号:US17457434

    申请日:2021-12-03

    Abstract: Examples associated with ransomware attack monitoring are described herein. One example includes a monitor module to monitor files stored on the system for sequences of file accesses that match a predefined pattern of file accesses. An investigation module is activated based on a sequence of file accesses that match the predefined pattern. The investigation module logs actions taken by processes to modify files. A reaction module pauses a set of processes operating on the system based on the logging performed by the investigation module, and resumes legitimate processes.

    Executing processes in sequence
    7.
    发明授权

    公开(公告)号:US11216561B2

    公开(公告)日:2022-01-04

    申请号:US16470283

    申请日:2017-04-18

    Abstract: In an example, a machine-readable medium includes instructions that, when executed by a processor, cause the processor to order, as part of an execution of a trusted process, a plurality of processes into a sequence comprising a first process, at least one intermediate process, and a last process. The machine-readable medium may further comprise instruction to cause the processor to generate, as part of an execution of the first process, a value based on a code portion of the process following the first process in the sequence, and to generate, as part of an execution of each intermediate process, a respective value based on the value generated by the process preceding the intermediate process in the sequence and based on a code portion associated with the process following the intermediate process in the sequence.

    APPARATUS AND METHOD FOR DYNAMIC SHARDING OF CONCURRENT BLOCKCHAINS

    公开(公告)号:US20210314154A1

    公开(公告)日:2021-10-07

    申请号:US17058149

    申请日:2018-10-17

    Abstract: An apparatus, being a network entity of a computer network is provided. The apparatus comprises a communication module to receive and to send information on a blockchain. Moreover, the apparatus comprises a query module to obtain from a master chain of the blockchain a rule for a first shard and a second shard of the blockchain with respect to a smart contract. Furthermore, the query module is to obtain information on the smart contract from the first shard or from the second shard depending on the rule. Moreover, the query module is to output the information on the smart contract.

    WORKFLOW MANAGEMENT
    10.
    发明申请

    公开(公告)号:US20220405426A1

    公开(公告)日:2022-12-22

    申请号:US17770069

    申请日:2019-10-31

    Abstract: In an example there is provided a method for certifying transactions of a workflow for a workflow comprising a set of transactions and a permitted order of execution of transactions. The method comprises generating verification data in response to a request from a client to certify a transaction of the workflow on the basis of a secure ledger where the verification data certifies the validity of the secure ledger. The method further comprises communicating the verification data to the client. The secure ledger is determined on the basis of workflow transactions.

Patent Agency Ranking