DYNAMIC PERMISSION MANAGEMENT OF STORAGE BLOCKS

    公开(公告)号:US20220391117A1

    公开(公告)日:2022-12-08

    申请号:US17303674

    申请日:2021-06-04

    Abstract: A method, a computer program product, and a system of dynamically managing permissions of storage blocks. The method includes predicting at least one storage block that will be accessed by a user on a storage device and predicting a time window when the storage block will be accessed the user. The predictions can be performed by a machine learning model trained using the historical accesses and access times of the user. The method also includes granting the user an access to the storage block during the time window and monitoring whether the storage block is accessed by the user. The method also includes determining, based on the monitoring, that the user accessed the storage block, and revoking the access to the storage block granted to the user after a predetermined access time.

    Endorsement process for non-deterministic application

    公开(公告)号:US11362826B2

    公开(公告)日:2022-06-14

    申请号:US16822274

    申请日:2020-03-18

    Abstract: An example operation may include one or more of receiving a storage request which comprises respective data sets generated by a plurality of endorser peers via simulation of a blockchain request, detecting that a key value of a data set generated by a first endorser peer is different than a respective key value of a data set generated by a second endorser peer, and committing the storage request to a data block of a blockchain in response to verifying that the detected different key values generated by the first and second endorser peers correspond to a multi-value key of the blockchain request.

    Mobile device location proofing
    5.
    发明授权

    公开(公告)号:US10368185B2

    公开(公告)日:2019-07-30

    申请号:US14940415

    申请日:2015-11-13

    Abstract: A computer implemented method, a computer program product and a computer system are disclosed that verify the location specified by a mobile device, for example when trying to gain access to a location-restricted service hosted by a computer system. This may be achieved by identifying at least one reference mobile device in the vicinity of the identified location of the first mobile device of which an identified location is to be verified, requesting from the at least one reference mobile device a reference location report including further pairing information identifying mobile devices with which the reference mobile device is paired; receiving the reference location report from the at least one reference mobile device; and verifying the location identification in a first location report received from the first mobile device by identifying the first mobile device in the further pairing information in the received at least one reference location report.

    Personal identification using action sequences detected by sensors

    公开(公告)号:US10360357B2

    公开(公告)日:2019-07-23

    申请号:US15402318

    申请日:2017-01-10

    Abstract: A method modifies a physical device for use by a particular person. One or more processors receive information from a sensor indicating a detection by the sensor of a sequence of actions performed by an unidentified person. The sequence of actions are physical actions performed in a particular order, and the physical actions are disparate types of physical movements performed by the unidentified person. One or more processors compare the sequence of actions performed by the unidentified person a known sequence of actions for a particular person. In response to the sequence of actions performed by the unidentified person matching the known sequence of actions for the particular person, one or more processors identify the unidentified person as the particular person and then modify a physical device for use by the particular person.

    Global attestation procedure
    7.
    发明授权

    公开(公告)号:US10218713B2

    公开(公告)日:2019-02-26

    申请号:US16025124

    申请日:2018-07-02

    Abstract: A method, computer program product, and system for authenticating a computing device by geographic attestation includes a processor utilizing executing an authentication application utilizing location services executing on the computing device to obtain location data from the location services. The processor obtains the location data and creates and encodes a data structure in a secured area of a memory; the data structure is only accessible to the authentication application. The processor transmits to an authentication server, an authentication request that includes the encoded location data, requesting access to secure content. The processor obtains a request to query identifiers proximate to the computing device for additional location information and queries the identifiers and transmits this additional location information to the authentication server. The processor receives a notification and based on obtaining the notification, erases the secured area and turns off the location services on the computing device.

    Anonymizing location information of a mobile device
    8.
    发明授权
    Anonymizing location information of a mobile device 有权
    匿名移动设备的位置信息

    公开(公告)号:US09319876B2

    公开(公告)日:2016-04-19

    申请号:US14669020

    申请日:2015-03-26

    CPC classification number: H04W12/02 H04L63/0421 H04W4/02

    Abstract: Anonymizing location information of a mobile device by an anonymization provider. The anonymization provider receives, from the mobile device, location information identifying the location of the mobile device and anonymity requirements. The anonymization provider determines whether the received location information satisfies the received anonymity requirements. Based on the received location information satisfying the received anonymity requirements, the anonymization provider generates an obfuscated location for the mobile device and sends the obfuscated location to the mobile device. Based on the received location information not satisfying the received anonymity requirements, the anonymization provider sends a request for new anonymity requirements to the mobile device.

    Abstract translation: 匿名提供者对移动设备的位置信息进行匿名化。 匿名提供者从移动设备接收标识移动设备的位置的位置信息和匿名要求。 匿名提供者确定所接收的位置信息是否满足所接收的匿名要求。 基于接收到的满足接收到的匿名要求的位置信息,匿名提供者为移动设备生成模糊的位置,并将该混淆的位置发送到移动设备。 基于接收到的不满足接收到的匿名要求的位置信息,匿名提供者向移动设备发送新的匿名要求请求。

    Mobile device location proofing
    10.
    发明授权

    公开(公告)号:US10939228B2

    公开(公告)日:2021-03-02

    申请号:US16433681

    申请日:2019-06-06

    Abstract: A computer implemented method, a computer program product and a computer system are disclosed that verify the location specified by a mobile device, for example when trying to gain access to a location-restricted service hosted by a computer system. This may be achieved by identifying at least one reference mobile device in the vicinity of the identified location of the first mobile device of which an identified location is to be verified, requesting from the at least one reference mobile device a reference location report including further pairing information identifying mobile devices with which the reference mobile device is paired; receiving the reference location report from the at least one reference mobile device; and verifying the location identification in a first location report received from the first mobile device by identifying the first mobile device in the further pairing information in the received at least one reference location report.

Patent Agency Ranking