-
公开(公告)号:US11070373B2
公开(公告)日:2021-07-20
申请号:US15901455
申请日:2018-02-21
Applicant: eBay Inc.
Inventor: Michael J. T. Chan , Derek Chamorro , Venkata Siva Vijayendra Bhamidipati , Glenn G. Lebumfacil , Ralph Scott Forsythe
Abstract: Methods, systems, and media for improving computer security and performance of security are disclosed. In one example, a computer security system comprises a key management monitor, and two key elements comprising a first key element and a second key element. The first key element is stored at a first location address within a computer memory and the second key element is stored at a second location address. The key management monitor is configured to determine or receive a time duration for performing a data dump of contents of the computer memory. In one example, the key management monitor is further configured to control a location of the first key element within the computer memory, wherein the location address of the first key element is changed within a time period that is less than the time duration for performing the data dump of contents of the computer memory.
-
公开(公告)号:US11108554B2
公开(公告)日:2021-08-31
申请号:US16842690
申请日:2020-04-07
Applicant: eBay Inc.
Inventor: Michael J. T. Chan , Sean R. Embry , Derek A. Chamorro , Anuj Kaul , Sahil Chadha , Nikhil Firke
Abstract: Techniques are shown for key tracing using a traceable key block-chain ledger involving, in response to detection of an attack on a resource protected by a cryptographic key, retrieving a key block-chain ledger corresponding to the cryptographic key having one or more transaction blocks. Each transaction block corresponds to a key transaction with the cryptographic key and includes metadata describing the key transaction with the cryptographic key. Metadata from the transaction blocks in the key block-chain ledger is used to trace the key transactions of the cryptographic key to a point of attack. A transaction block corresponding to the point of attack is determined and an alert is generated indicating the point of attack with metadata from the transaction block corresponding to the point of attack.
-
公开(公告)号:US11956357B2
公开(公告)日:2024-04-09
申请号:US18219144
申请日:2023-07-07
Applicant: eBay Inc.
Inventor: Michael J. T. Chan , Sean R. Embry , Derek A. Chamorro , Anuj Kaul , Sahil Chadha , Nikhil Firke
CPC classification number: H04L9/0894 , G06F21/64 , H04L9/002 , H04L9/0637 , H04L9/08 , H04L9/0819 , H04L9/0861 , H04L9/0891 , H04L9/14 , H04L9/30 , H04L9/3247 , H04L9/50
Abstract: Techniques are shown for key management using a traceable key blockchain. A first block corresponding to a cryptographic key is generated on the blockchain, and the first block is securely modified to include metadata describing a key source for the cryptographic key. A second block corresponding to a first key transaction with the cryptographic key is generated on the blockchain, the second block is linked to the first block, and the second block is securely modified to include metadata describing the first key transaction with the cryptographic key.
-
公开(公告)号:US10715323B2
公开(公告)日:2020-07-14
申请号:US15858949
申请日:2017-12-29
Applicant: eBay, Inc.
Inventor: Michael J. T. Chan , Sean R. Embry , Derek A. Chamorro , Anuj Kaul , Sahil Chadha , Nikhil Firke
Abstract: Techniques are shown for key management using a traceable key block-chain ledger involving creating a cryptographic key at a key source, generating a genesis block for a key block-chain ledger corresponding to the cryptographic key, and securely modifying the genesis block to include metadata describing the key source. The techniques also involve performing a first key transaction with the cryptographic key, generating a first transaction block corresponding to the first key transaction with the cryptographic key and adding the first transaction block to the key block-chain ledger, and securely modifying the first transaction block to include metadata describing the first key transaction with the cryptographic key.
-
公开(公告)号:US11736288B2
公开(公告)日:2023-08-22
申请号:US17388873
申请日:2021-07-29
Applicant: eBay Inc.
Inventor: Michael J. T. Chan , Sean R. Embry , Derek A. Chamorro , Anuj Kaul , Sahil Chadha , Nikhil Firke
CPC classification number: H04L9/0894 , G06F21/64 , H04L9/002 , H04L9/0637 , H04L9/08 , H04L9/0819 , H04L9/0861 , H04L9/0891 , H04L9/14 , H04L9/30 , H04L9/3247 , H04L9/50
Abstract: Techniques are shown for key management using a traceable key block-chain ledger involving creating a cryptographic key at a key source, generating a key block on a block-chain ledger corresponding to the cryptographic key, and securely modifying the key block to include metadata describing the key source. The techniques also involve performing a first key transaction with the cryptographic key, generating a first transaction block on the block-chain ledger corresponding to the first key transaction with the cryptographic key, linking the first transaction block to the key block and securely modifying the first transaction block to include metadata describing the first key transaction with the cryptographic key.
-
公开(公告)号:US11683169B2
公开(公告)日:2023-06-20
申请号:US17340798
申请日:2021-06-07
Applicant: EBAY INC.
Inventor: Michael J. T. Chan , Derek Chamorro , Venkata Siva Vijayendra Bhamidipati , Glenn G. Lebumfacil , Ralph Scott Forsythe
CPC classification number: H04L9/0894 , G06F21/52 , G06F21/62 , G06F21/75 , H04L9/0891 , H04L2209/04
Abstract: Systems and methods for managing keys in a computer memory are described. In some embodiments, location addresses are determined for two key elements. A periodic time interval that is based on a time duration for performing a transaction involving a distance between the key elements is determined. One key element may be stored at a location address and then relocated to another location address after the periodic time interval has passed. In some embodiments, areas the computer memory may remain static during relocation of the key element.
-
-
-
-
-