Validating Computer Resource Usage

  • Published: Aug 18, 2016
  • Earliest Priority: Feb 11 2015
  • Family: 3
  • Cited Works: 1
  • Cited by: 14
  • Cites: 2
  • Additional Info: Full text

A computer implemented method for validating use of a computing resource by a requester software component comprising: validating a characteristic of the requester; generating a first transaction defining criteria for consumption of the resource by the requester, the first transaction being encrypted with a private key from a public key/private key pair and being added as part of a block of transactions to a blockchain data structure; generating a subsequent encrypted transaction corresponding to a request of the requester to consume the resource, the subsequent transaction referring to the first transaction, wherein the subsequent transaction is validated by a transaction miner computing component from a plurality of miners by authenticating the transaction using the public key and verifying compliance with the criteria defined in each transaction.

Download PDF
Document Preview
Document History
  • Publication: Aug 18, 2016
  • Application: Feb 10, 2016
    WO EP 2016052865 W
  • Priority: Feb 11, 2015
    EP EP 15275030 A

Download Citation

Sign in to the Lens