Highly scalable permissioned block chains

    公开(公告)号:US11809551B2

    公开(公告)日:2023-11-07

    申请号:US17549027

    申请日:2021-12-13

    Applicant: EBAY INC.

    CPC classification number: G06F21/54 G06Q20/3678 G06Q20/405 H04L9/0637

    Abstract: Technologies are shown for function level permissions control for smart contract execution to implement permissions policy on a blockchain. Permissions control rules control function calls at a system level utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for a smart contract. The permissions control rules are applied to the call stack to implement permissions control policy. Permissions control rules can use dynamic state data in the function call chain. If the dynamic state data observed in function call chains does not meet the requirements defined in the permissions control rules, then the function call can be blocked from executing or completing execution. The permissions control rules can be generated for a variety of different entities, such as a domain, user or resource.

    System level function based access control for smart contract execution on a blockchain

    公开(公告)号:US11899783B2

    公开(公告)日:2024-02-13

    申请号:US17571371

    申请日:2022-01-07

    Applicant: EBAY INC.

    CPC classification number: G06F21/54 G06Q20/3678 G06Q20/405 H04L9/0637

    Abstract: Technologies are shown for system level function based access control for smart contract execution on a blockchain. Access control rules control function calls at a system level by utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for execution of a smart contract. The access control rules are applied to the function call stack to allow or prohibit specific functions or function call chains. Access control rules can also define allowed or prohibited parameter data in the function call chain. If the function call chain or parameters do not meet the requirements defined in the access control rules, then the function call can be blocked from executing or completing execution. The access control rules can produce sophisticated access control policies based on complex function call chains.

    Blockchain consensus protocol using predictive proof of metrics

    公开(公告)号:US11676135B2

    公开(公告)日:2023-06-13

    申请号:US16742726

    申请日:2020-01-14

    Applicant: eBay inc.

    CPC classification number: G06Q20/382 G06F9/5005 G06N5/04

    Abstract: Technologies are shown for selecting a provider to service a client service request using a predictive metrics based consensus protocol to select a provider and create a service request transaction block to service the client service request. A client service request is received and forwarded to a set of providers. Proposed transactions are received from the providers and scored based on a predictive metric. A proposal transaction is selected based on the scoring and the selected transaction is written as a block on a service transaction blockchain. The provider for the selected transaction detects the block on the blockchain and performs the requested service. The client detects the block on the blockchain and transfers payment to the provider. Selection can be based on predictive metrics in the providers or macro metrics determined in miner nodes in combination with provider reputation, currency, load sharing, fairness, provisioning, and static and dynamic criteria.

    System level function based access control for smart contract execution on a blockchain

    公开(公告)号:US11263315B2

    公开(公告)日:2022-03-01

    申请号:US16429656

    申请日:2019-06-03

    Applicant: eBay Inc.

    Abstract: Technologies are shown for system level function based access control for smart contract execution on a blockchain. Access control rules control function calls at a system level by utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for execution of a smart contract. The access control rules are applied to the function call stack to allow or prohibit specific functions or function call chains. Access control rules can also define allowed or prohibited parameter data in the function call chain. If the function call chain or parameters do not meet the requirements defined in the access control rules, then the function call can be blocked from executing or completing execution. The access control rules can produce sophisticated access control policies based on complex function call chains.

    Highly scalable permissioned block chains

    公开(公告)号:US11250125B2

    公开(公告)日:2022-02-15

    申请号:US16698210

    申请日:2019-11-27

    Applicant: eBay Inc.

    Abstract: Technologies are shown for function level permissions control for smart contract execution to implement permissions policy on a blockchain. Permissions control rules control function calls at a system level utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for a smart contract. The permissions control rules are applied to the call stack to implement permissions control policy. Permissions control rules can use dynamic state data in the function call chain. If the dynamic state data observed in function call chains does not meet the requirements defined in the permissions control rules, then the function call can be blocked from executing or completing execution. The permissions control rules can be generated for a variety of different entities, such as a domain, user or resource.

Patent Agency Ranking