Automated role management for resource accessing code

    公开(公告)号:US11790058B2

    公开(公告)日:2023-10-17

    申请号:US17814366

    申请日:2022-07-22

    IPC分类号: G06F21/12 G06F21/44 G06F8/33

    CPC分类号: G06F21/125 G06F8/33 G06F21/44

    摘要: Computer systems and methods are disclosed to implement a role manager that automatically analyzes code accessing various resources to generate a role with the necessary resource permissions to execute the code. In embodiments, the role manager may be implemented as part of a workflow orchestration or resource provisioning system that employs code requiring access to different types of resources. In embodiments, the role manager may analyze a code segment to identify the different resources accessed by the code segment and the permissions needed for each access, and generate a role that has the needed permissions. In embodiments, the role manager may automatically manage these roles based on changes to associated code segments. Advantageously, the disclosed role manager removes the need to manually create roles need by code segments ahead of time, and creates roles with minimal privileges required for the code, thereby simplifying achievement of system security.

    CRYPTOGRAPHICALLY MANAGING LICENSE COMPATIBILITY

    公开(公告)号:US20230273979A1

    公开(公告)日:2023-08-31

    申请号:US18143287

    申请日:2023-05-04

    IPC分类号: G06F21/10 H04L9/32 G06F21/12

    摘要: This disclosure describes techniques for implementing a blockchain to manage license compatibility. The techniques include parsing a code segment in a version of source code based on one or more parsing parameters, wherein the code segment is associated with a transaction and distributed under a license. Thereafter, one or more blocks are inserted onto a blockchain distributed ledger recording the transaction. Upon receiving an updated version of the source code comprising a change to at least one code segment associated with a new transaction, additional blocks are inserted onto the ledger recording the new transaction. Based at least on the transaction recorded in the blocks, the license associated with the version of the source code is identified. Additionally, a flag may indicate license incompatibility with the license if the change to at least one code segment associated with the new transaction violates a license restriction of the identified license.

    Controlling access to digital assets

    公开(公告)号:US11704389B2

    公开(公告)日:2023-07-18

    申请号:US17397876

    申请日:2021-08-09

    申请人: F. Scott Deaver

    发明人: F. Scott Deaver

    摘要: The apparatus disclosed herein, in various aspects, includes a digital asset, and an amulet that comprises an encrypted self-validating string. The amulet may be external to the digital asset. The apparatus may include a manager that cooperates securely with the digital asset and cooperates securely with the amulet to control access to the digital asset as specified by the amulet. In some aspects, the manager cooperates with the digital asset and with the amulet, at least in part, through shared memory in process space. In other aspects, the manager cooperates with the digital asset and with the amulet, at least in part, through a RAM drive in memory, the RAM drive at least partially hidden from an operating system of the computer. In yet other aspects, the manager cooperates with the digital asset and with the amulet, at least in part, through a virtual machine accessible only by said apparatus. The amulet, the manager, and the digital asset are either operably receivable by a computer or are operably received by the computer, in various aspects. Related methods and compositions of matter are also disclosed.

    DETECTING STACK COOKIE UTILIZATION IN A BINARY SOFTWARE COMPONENT USING BINARY STATIC ANALYSIS

    公开(公告)号:US20190205527A1

    公开(公告)日:2019-07-04

    申请号:US16209457

    申请日:2018-12-04

    发明人: Adam John BOULTON

    IPC分类号: G06F21/52 G06F21/57 G06F8/41

    摘要: Systems, methods, and software can be used to detect stack cookie utilization in a binary software component using binary static analysis. In some aspects, one computer-implemented method includes identifying a function defined in the binary software component, the function including one or more instructions; performing a binary static analysis of the function to determine whether the function utilizes stack cookie protection based on the one or more instructions including one or more stack cookie handling instructions; and in response to determining that the function utilizes stack cookie protection, updating a security report for the binary software component to indicate that the function utilizes stack cookie protection.

    A METHOD OF DATA PROCESSING AND PROVIDING ACCESS TO THE PROCESSED DATA ON USER HARDWARE DEVICES AND A SYSTEM CONNECTION

    公开(公告)号:US20190197249A1

    公开(公告)日:2019-06-27

    申请号:US16331559

    申请日:2017-09-11

    摘要: A system connection for data processing and accessing the processed data on user hardware devices includes interconnected user hardware devices, an operating server and bank communication hardware. A computation and communication block of the user hardware devices is connected with a request block of the operating server. The request block of the operating server is followed by a verification database with the first output of the confirmed ownership rights to a confirmation/decryption key generation block of the operating server and the second output of partial or no rights to a calculation block of the operating server. The calculation block of the operating server is connected with a processing block of the user hardware devices and the bank hardware. The processing block of the user hardware devices is connected with a payment block of the user hardware devices, which is connected with the bank hardware. The bank hardware is connected to a processing block of the operating server, which is connected with the confirmation/decryption key generation block of the operating server. The confirmation/decryption key generation block of the operating server is connected with a result database of the user hardware devices. The confirmation/decryption key generation block of the operating server is connected with the verification database.