×

Method and apparatus for secure signing and utilization of distributed computations

  • US 10,068,108 B2
  • Filed: 05/30/2017
  • Issued: 09/04/2018
  • Est. Priority Date: 05/12/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • determining, by an apparatus, a lattice of signatures of a distributed cloud computation environment, wherein the distributed cloud computation environment includes a plurality of functional flows, at least one of the functional flows includes distribution paths that represent a distribution of computation closures associated with respective levels of the distributed cloud computation environment, each of the computation closures is a granular reflective set of instructions, data, and related execution context, the lattice consists of root elements of all signatures in the distributed cloud computation environment, and the root elements are parameters of one or more security requirements, one or more functional flow specifications, one or more computation distribution maps, one or more links among the computation closures and the respective levels, or a combination thereof in the distributed cloud computation environment;

    formatting, by the apparatus, each of the computation closures of the at least one functional flow and a subset of the signatures corresponding to the computation closures in a predetermined semantic information representation structure;

    initiating, by the apparatus, a signing of the computation closures with the of the signatures;

    initiating, by the apparatus, a transfer of the signed computation closures among one or more of the respective levels, one or more nodes, or a combination thereof of the distributed cloud computation environment;

    initiating, by the apparatus, an authentication of the signed computation closures as transferred by comparing the lattice with root elements of the signed computation closures; and

    initiating, by the apparatus, an execution of the signed computation closures at the one or more levels, the one or more nodes, or a combination thereof based, at least in part, on an authentication of the signed computation closure.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×