Patents by Inventor Dulce B. Ponceleon
Dulce B. Ponceleon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10833845Abstract: An example operation may include one or more of connecting, by an attester node, to a blockchain network A configured to store hashes of blocks A, coupling, by the attester node, the blockchain network A with a blockchain network B configured to store hashes of blocks B, receiving, by the attester node, a request from the blockchain network A to send a hash of a block A produced at a time t1 (AHash_1) to the blockchain network B, confirming, by the attester node, that the blockchain network A has stored a hash of a block B produced at a time t0 (BHash_0), sending, by the attester node, the AHash_1 to the blockchain network B to be stored, receiving, by the attester node, a hash of the block B produced at the time t1 (BHash_1) from the blockchain network B, confirming, by the attester node, that the blockchain network B has stored a hash of a block A produced at the time t0 (AHash_0), and providing, by the attester node, the BHash_1 to the blockchain network A to be stored, wherein the t0 is less than the t1.Type: GrantFiled: August 30, 2018Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Jeronimo Irazabal, Dulce B. Ponceleon
-
Patent number: 10834095Abstract: An example operation may include one or more of receiving a request for performing a post-commit validation of a chain of blocks on a distributed ledger, the chain of blocks being encrypted using an encryption key, requesting cooperation from one or more auditor nodes associated with the distributed ledger, each auditor node comprising a partial secret of a decryption key corresponding to the encryption key, and, in response to receiving partial secrets from a minimum threshold of auditor nodes, recovering the decryption key based on the received partial secrets, decrypting the chain of blocks based on the recovered decryption key, and validating content included within the chain of blocks.Type: GrantFiled: May 17, 2018Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Jeronimo Irazabal, Andres Garagiola, Dulce B. Ponceleon
-
Patent number: 10819523Abstract: An example operation may include one or more of connecting, by an attester node, to a source blockchain network configured to store hashes of source blocks, collaboratively coupling, by the attester node, the source blockchain network with a target blockchain network configured to store hashes of target blocks, receiving, by the attester node, a request from the source blockchain network to store the hash of the source block on the target blockchain network, confirming, by the attester node, that the source network has a previously stored hash of the target block, in response to the confirmation that the source blockchain network has a previously stored hash of the target block, allowing, by the attester node, to store the hash of the source block on the target blockchain network, and continuing, by the attester node, a collaboration between the source blockchain network and the target blockchain network.Type: GrantFiled: August 30, 2018Date of Patent: October 27, 2020Assignee: International Business Machines CorporationInventors: Jeronimo Irazabal, Dulce B. Ponceleon
-
Publication number: 20200252202Abstract: An example operation may include one or more of receiving a request to certify a digital record, retrieving a first hashed data value of the digital record from a data block included among a first hash-linked chain of blocks on a first blockchain, retrieving a second hashed data value of the digital record from a second data block included among a second hash-linked chain of blocks on a second blockchain which is different from the first blockchain, determining whether the digital record is valid based on a cross-validation of the first hashed data value and the second hashed data value, and storing the determination of the validity of the digital record in a data block among a third hash-linked chain of blocks.Type: ApplicationFiled: February 6, 2019Publication date: August 6, 2020Inventors: Gabor Madl, Luis Angel D. Bathen, Ramani R. Routray, Diego A. Masini, Dulce B. Ponceleon
-
Patent number: 10700853Abstract: One example method of operation may include receiving a request, from an entity, for one or more tokens based on one or more attributes, encrypting and masking the one or more attributes, adding the encrypted and masked one or more attributes to the one or more tokens, and transmitting the one or more tokens to the entity.Type: GrantFiled: May 9, 2017Date of Patent: June 30, 2020Assignee: International Business Machines CorporationInventors: David W. Kravitz, Dulce B. Ponceleon, Diego A. Masini, Raul O. Laprida, Andres Garagiola, John B. Geagan, III
-
Publication number: 20200166962Abstract: An example operation may include one or more of connecting, by a clock node, to a blockchain network comprised of a plurality of nodes, retrieving, by the clock node, a timestamp (Ts) of the clock node, acquiring, by the clock node, a time window (Tw) based on the Ts, reading, by the clock node, a current window (Cw) from a world state, determining, by the clock node, a gap as a difference between the Tw and the Cw, calculating, by the clock node, a clock fix value based on the gap, and adjusting a clock by a subtraction of the clock fix value from theType: ApplicationFiled: November 28, 2018Publication date: May 28, 2020Inventors: Dulce B. Ponceleon, Diego A. Masini, Raul O. Laprida, Andres Garagiola
-
Publication number: 20200142891Abstract: An example operation may include one or more of identifying a blockchain transaction, storing the blockchain transaction in a blockchain, assigning the blockchain transaction a transaction number and a block number, hashing a portion of blockchain transaction data associated with the blockchain transaction, and updating a blockchain index based on the hashed portion of the blockchain transaction.Type: ApplicationFiled: January 3, 2020Publication date: May 7, 2020Inventors: Andres Garagiola, Jeronimo Irazabal, Raul Laprida, Guillermo R. Lopez, Diego Masini, Dulce B. Ponceleon
-
Publication number: 20200092364Abstract: An example operation may include one or more of connecting, by a recipient node, to a blockchain network configured to store links to digital assets of an owner, selecting, by the recipient node, an asset from a ledger of the owner, executing, by the recipient node, a smart contract to determine a time frame of the asset use, executing, by the recipient node, a smart contract to download the asset to the recipient node, checking, by the recipient node, if the asset is downloaded successfully, and in response to the successful download of the asset, executing, by the recipient node, a smart contract to log an asset transfer transaction onto the blockchain.Type: ApplicationFiled: September 19, 2018Publication date: March 19, 2020Inventors: Kevin L. Schultz, Darryl Adderly, Rosanna Mannan, Diego A. Masini, Andres Garagiola, Dulce B. Ponceleon
-
Publication number: 20200076608Abstract: An example operation may include one or more of connecting, by an attester node, to a source blockchain network configured to store hashes of source blocks, collaboratively coupling, by the attester node, the source blockchain network with a target blockchain network configured to store hashes of target blocks, receiving, by the attester node, a request from the source blockchain network to store the hash of the source block on the target blockchain network, confirming, by the attester node, that the source network has a previously stored hash of the target block, in response to the confirmation that the source blockchain network has a previously stored hash of the target block, allowing, by the attester node, to store the hash of the source block on the target blockchain network, and continuing, by the attester node, a collaboration between the source blockchain network and the target blockchain network.Type: ApplicationFiled: August 30, 2018Publication date: March 5, 2020Inventors: Jeronimo Irazabal, Dulce B. Ponceleon
-
Publication number: 20200076572Abstract: An example operation may include one or more of connecting, by an attester node, to a blockchain network A configured to store hashes of blocks A, coupling, by the attester node, the blockchain network A with a blockchain network B configured to store hashes of blocks B, receiving, by the attester node, a request from the blockchain network A to send a hash of a block A produced at a time t1 (AHash_1) to the blockchain network B, confirming, by the attester node, that the blockchain network A has stored a hash of a block B produced at a time t0 (BHash_0), sending, by the attester node, the AHash_1 to the blockchain network B to be stored, receiving, by the attester node, a hash of the block B produced at the time t1 (BHash_1) from the blockchain network B, confirming, by the attester node, that the blockchain network B has stored a hash of a block A produced at the time t0 (AHash_0), and providing, by the attester node, the BHash_1 to the blockchain network A to be stored, wherein the t0 is less than the t1.Type: ApplicationFiled: August 30, 2018Publication date: March 5, 2020Inventors: Jeronimo Irazabal, Dulce B. Ponceleon
-
Patent number: 10565192Abstract: An example operation may include one or more of identifying a blockchain transaction, storing the blockchain transaction in a blockchain, assigning the blockchain transaction a transaction number and a block number, hashing a portion of blockchain transaction data associated with the blockchain transaction, and updating a blockchain index based on the hashed portion of the blockchain transaction.Type: GrantFiled: August 1, 2017Date of Patent: February 18, 2020Assignee: International Business Machines CorporationInventors: Andres Garagiola, Jeronimo Irazabal, Raul Laprida, Guillermo R. Lopez, Diego Masini, Dulce B. Ponceleon
-
Publication number: 20200052880Abstract: An example operation may include one or more of identifying a group of blockchain member devices attempting to establish a trusted group communication channel, assigning each of the blockchain member devices public/private key pairs, publishing the public keys of the blockchain member devices in a list, identifying a request from a first blockchain member device requesting a private key, associated with a second blockchain member device, be applied to a predetermined nonce value, responsive to identifying a response to the request, verifying, via a public key assigned to the first blockchain member device, that the second blockchain member device is a trusted member of the group of blockchain member devices, and responsive to verifying the second blockchain member device is a trusted member of the group of blockchain member devices, permitting communication between the first blockchain member device and the second blockchain member device on the trusted group communication channel.Type: ApplicationFiled: August 8, 2018Publication date: February 13, 2020Inventors: Luis Angel D. Bathen, Dulce B. Ponceleon, Marc H. Coq, Colette Manoni, Collin Walling, Corey McQuay, Eugene E. Nitka, Trent Balta
-
Publication number: 20200036513Abstract: Encryption key block generation with barrier descriptors is provided. In some embodiments, a descriptor is read. The descriptor includes a list of revoked devices and a list of boundaries between devices. A plurality of subset differences is generated. The plurality of subset-differences covers a plurality of devices. None of the plurality of devices appears in the list of revoked devices. None of the plurality of subset differences spans any of the boundaries. Encrypted information is generated based on the subset differences.Type: ApplicationFiled: July 26, 2018Publication date: January 30, 2020Inventors: John B. Geagan, Dulce B. Ponceleon
-
Publication number: 20200004931Abstract: An encryption scheme is provided in which subset-difference lists are generated by blacklisting subsets corresponding to compromised devices and splitting subset difference lists corresponding to the blacklisted subsets into multiple subset difference lists. In some embodiments, a subset-difference tree is generated. The subset-difference tree includes a plurality of subsets. The subset-difference tree covers a plurality of nodes. Each of the plurality of subsets has an apex node among the plurality of nodes. At least one blacklisted node of the plurality of nodes is determined. A first subset among the plurality of subsets is identified that covers the at least one blacklisted node. A plurality of substitute subsets is determined. Each of the plurality of substitute subsets overlaps the first subset and does not cover the at least one blacklisted node. The plurality of substitute subsets are substituted for the first subset.Type: ApplicationFiled: September 12, 2019Publication date: January 2, 2020Inventors: John B. Geagan, Dulce B. Ponceleon
-
Publication number: 20190372965Abstract: One example method may include generating a template transaction certificate by one or more entities which verify proof of ownership of attributes incorporated into the template transaction certificate, and generating one or more operational transaction certificates by the one or more entities which verified proof of ownership of the template transaction certificate.Type: ApplicationFiled: August 14, 2019Publication date: December 5, 2019Inventors: David W. Kravitz, Dulce B. Ponceleon, Diego A. Masini, John B. Geagan, III, Brian K. Smith
-
Publication number: 20190362361Abstract: An example operation may include one or more of a method for providing a one-step transaction submission in a blockchain network, comprising sending a transaction proposal, by a client node, to one or more peers of a plurality of peers, simulating a transaction associated with the transaction proposal, by at least one peer of the plurality of peers, evaluating, by an endorser peer, whether an endorsement policy has been fulfilled, and when the endorsement policy has been fulfilled, sending the transaction to at least one orderer node to be committed to a ledger, by the endorser peer.Type: ApplicationFiled: May 23, 2018Publication date: November 28, 2019Inventors: Jeronimo Irazabal, Andres Garagiola, Diego A. Masini, Dulce B. Ponceleon
-
Publication number: 20190356674Abstract: An example operation may include one or more of receiving a request for performing a post-commit validation of a chain of blocks on a distributed ledger, the chain of blocks being encrypted using an encryption key, requesting cooperation from one or more auditor nodes associated with the distributed ledger, each auditor node comprising a partial secret of a decryption key corresponding to the encryption key, and, in response to receiving partial secrets from a minimum threshold of auditor nodes, recovering the decryption key based on the received partial secrets, decrypting the chain of blocks based on the recovered decryption key, and validating content included within the chain of blocks.Type: ApplicationFiled: May 17, 2018Publication date: November 21, 2019Inventors: Jeronimo Irazabal, Andres Garagiola, Dulce B. Ponceleon
-
Patent number: 10476669Abstract: Space-efficient key allocations in broadcast encryption systems are provided. In some embodiments, a key bundle is read. The key bundle includes a first cryptographic key, an associated first key identifier, and an associated first cryptographic function identifier. A plurality of encrypted keys is received. Each encrypted key has an associated identifier. A first encrypted key is selected from the plurality of encrypted keys such that the key identifier of the first encrypted is equivalent to the first key identifier. A first cryptographic function is determined corresponding to the first cryptographic function identifier. The first cryptographic function is applied to the first encrypted key using the first cryptographic key to obtain a first intermediate cryptographic key. A content cryptographic key is determined using the first intermediate cryptographic key. The content cryptographic key is adapted for decryption of encrypted content.Type: GrantFiled: April 28, 2016Date of Patent: November 12, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Dulce B. Ponceleon
-
Patent number: 10467384Abstract: An encryption scheme is provided in which subset-difference lists are generated by blacklisting subsets corresponding to compromised devices and splitting subset difference lists corresponding to the blacklisted subsets into multiple subset difference lists. In some embodiments, a subset-difference tree is generated. The subset-difference tree includes a plurality of subsets. The subset-difference tree covers a plurality of nodes. Each of the plurality of subsets has an apex node among the plurality of nodes. At least one blacklisted node of the plurality of nodes is determined. A first subset among the plurality of subsets is identified that covers the at least one blacklisted node. A plurality of substitute subsets is determined. Each of the plurality of substitute subsets overlaps the first subset and does not cover the at least one blacklisted node. The plurality of substitute subsets are substituted for the first subset.Type: GrantFiled: May 18, 2016Date of Patent: November 5, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John B. Geagan, Dulce B. Ponceleon
-
Patent number: 10425399Abstract: One example method may include generating a template transaction certificate by one or more entities which verify proof of ownership of attributes incorporated into the template transaction certificate, and generating one or more operational transaction certificates by the one or more entities which verified proof of ownership of the template transaction certificate.Type: GrantFiled: June 23, 2017Date of Patent: September 24, 2019Assignee: International Business Machines CorporationInventors: David W. Kravitz, Dulce B. Ponceleon, Diego A. Masini, John B. Geagan, III, Brian K. Smith