17819689. SYSTEMS AND METHODS FOR ORCHESTRATING APPLICATION USE WHILE PREVENTING UNAUTHORIZED DATA SHARING simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR ORCHESTRATING APPLICATION USE WHILE PREVENTING UNAUTHORIZED DATA SHARING

Organization Name

Capital One Services, LLC

Inventor(s)

John Henry Page of Washington DC (US)

SYSTEMS AND METHODS FOR ORCHESTRATING APPLICATION USE WHILE PREVENTING UNAUTHORIZED DATA SHARING - A simplified explanation of the abstract

This abstract first appeared for US patent application 17819689 titled 'SYSTEMS AND METHODS FOR ORCHESTRATING APPLICATION USE WHILE PREVENTING UNAUTHORIZED DATA SHARING

Simplified Explanation

    • Explanation:**

The patent application describes methods and systems for managing application use and preventing unauthorized data sharing. It involves orchestrating the use of applications in a virtual environment while ensuring data security.

  • An orchestration management system provides logic to a computing platform hosting a virtual environment for running an application on behalf of a data owner.
  • The system provides a public key and location of the virtual environment to the application owner's device.
  • The application owner's device can access the virtual environment using a key combination, including the public key and a matching private key.
  • The private key is then disabled by the orchestration logic to prevent unauthorized access to the virtual environment and data sharing.
    • Potential Applications:**
  • Cloud computing security
  • Data privacy protection in virtual environments
  • Secure application deployment and management
    • Problems Solved:**
  • Unauthorized data sharing in virtual environments
  • Ensuring data security and privacy in application use
  • Preventing unauthorized access to sensitive information
    • Benefits:**
  • Enhanced data security measures
  • Secure application deployment and management
  • Protection against unauthorized data sharing


Original Abstract Submitted

Disclosed are methods and systems for orchestrating application use while preventing unauthorized data sharing. For instance, an orchestration management system may provide orchestration logic to a computing platform system hosting a virtual environment configured to run an application on behalf of a data owner computing device. Once the orchestration logic is loaded thereon, a public key to and a location of the virtual environment may be provided to an application owner's computing device. The orchestration logic may enable the application owner's computing device to access the virtual environment at the location to load the application into the virtual environment utilizing a first key combination including the public key and a matching private key. At least the private key may then be disabled by the orchestration logic to prevent subsequent access to the virtual environment by the application owner to guarantee no unauthorized data sharing.