US 12,407,704 B2
Blockchain malware protection
Douglas Max Grover, Provo, UT (US); and Michael F. Angelo, Houston, TX (US)
Assigned to Micro Focus LLC, Santa Clara, CA (US)
Filed by MICRO FOCUS LLC, Santa Clara, CA (US)
Filed on Oct. 11, 2023, as Appl. No. 18/485,019.
Application 18/485,019 is a division of application No. 17/356,164, filed on Jun. 23, 2021, granted, now 12,273,365.
Prior Publication US 2024/0039943 A1, Feb. 1, 2024
Int. Cl. H04L 9/40 (2022.01); G06N 20/00 (2019.01); H04L 9/32 (2006.01); H04L 9/00 (2022.01)
CPC H04L 63/1425 (2013.01) [G06N 20/00 (2019.01); H04L 9/3247 (2013.01); H04L 63/1416 (2013.01); H04L 63/145 (2013.01); H04L 9/50 (2022.05)] 20 Claims
OG exemplary drawing
 
1. A system, comprising:
a microprocessor; and
a computer readable medium, coupled with the microprocessor and comprising microprocessor readable and executable instructions that, when executed by the microprocessor, cause the microprocessor to:
identify a malware event, wherein the malware event identifies a block in a blockchain that has associated data that comprises malware and/or an anomaly; and
in response to identifying the malware event that identifies the block in the blockchain that has the associated data that comprises the malware and/or the anomaly, doing at least one of the following actions:
consolidate the blockchain;
consolidate the blockchain and bypass the block in the blockchain that comprises the malware and/or anomaly; and
delete an encryption key that was used to encrypt the associated data that comprises the malware and/or the anomaly.