BLOCKCHAIN-BASED MALWARE CONTAINMENT IN A NETWORK RESOURCE

    公开(公告)号:US20200099698A1

    公开(公告)日:2020-03-26

    申请号:US16137630

    申请日:2018-09-21

    Abstract: A method contains malware within a network resource. A blockchain system establishes a smart contract, on the blockchain system, for a network resource in a computer environment. The smart contract is for an action to be performed on the network resource if a malware is detected on the network resource. In response to malware being detected in the network resource, the blockchain system determines whether a consensus is reached by a plurality of computers on the blockchain system to implement the action to contain the malware based on the smart contract. In response to the consensus being reached by the plurality of computers, the blockchain system transmits, to the network resource, directions to implement the action on the network resource as specified by the smart contract.

    VERIFICATION OF GEOLOCATION OF DEVICES IN A CLOUD DATA CENTER

    公开(公告)号:US20180191733A1

    公开(公告)日:2018-07-05

    申请号:US15396914

    申请日:2017-01-03

    Abstract: A processor-implemented method alters a computer resource based on its new geolocation. One or more processors receive a message that a computer resource has moved from a first geolocation to a new geolocation. The processor(s) receive an identifier of the new geolocation for the computer resource. In response to receiving the identifier of the new geolocation for the computer resource, the processor(s) request and receive encrypted data from the new geolocation. The processor(s) apply decryption information to the encrypted data from the new geolocation, where the decryption information is specifically for decrypting encrypted data from the new geolocation. In response to the decryption information failing to decrypt the encrypted data from the new geolocation, the processor(s) determine that the identifier of the new geolocation is false and apply a geolocation based resource policy to alter the computer resource at the new geolocation.

    PROTECTING STACK MEMORY IN COMPUTER SYSTEMS
    29.
    发明申请

    公开(公告)号:US20190286814A1

    公开(公告)日:2019-09-19

    申请号:US16430931

    申请日:2019-06-04

    Abstract: A computer-implemented method protects stack memory by moving contents of stack memory to an accumulation general purpose register. One or more processors identify an authorized function and a malicious function in a computer program, in which the malicious function is able to execute a call that provides the malicious function with access to stack memory that is used by the authorized function. The processor(s) move data from the stack memory to a protected kernel register before the call is executed, and store results of execution of the authorized function in a first register that is accessible only to the authorized function. The processor(s) then clear the stack memory, and move the results of execution of the authorized function from the first register to an accumulation general purpose register that is also accessible only to the authorized function.

    CONTROLLING ACCESS TO ELECTRONIC RESOURCES BASED ON A USER'S SOCIOMETRIC IDENTIFICATION DOCUMENT

    公开(公告)号:US20190260726A1

    公开(公告)日:2019-08-22

    申请号:US16399276

    申请日:2019-04-30

    Abstract: A method establishes a session between a network service and a user device used by the user having a particular sociometric identity. One or more processors identify an interaction between a user and one or more provider entities. The processor(s) identify profiles for the one or more provider entities, where each profild of the one or more provider entities describes a type of service provided by a respective provider entity of the one or more provider entities, and compute a sociometric identity of the user based on the profiles of the one or more provider entities with which the user has had an interaction. One or more processors transmit the sociometric identity to a network service in order to establish a session between the network service and a user device used by the user having the sociometric identity.

Patent Agency Ranking