17931507. SYSTEMS AND METHODS FOR USER CONTROL AND EXCLUSION OF CRYPTOGRAPHIC TOKENIZED DATA simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR USER CONTROL AND EXCLUSION OF CRYPTOGRAPHIC TOKENIZED DATA

Organization Name

Capital One Services, LLC

Inventor(s)

Julian Duque of Arlington VA (US)

Purva Shanker of Arlington VA (US)

Samuel Rapowitz of Roswell GA (US)

Dennis Liu of Richmond VA (US)

SYSTEMS AND METHODS FOR USER CONTROL AND EXCLUSION OF CRYPTOGRAPHIC TOKENIZED DATA - A simplified explanation of the abstract

This abstract first appeared for US patent application 17931507 titled 'SYSTEMS AND METHODS FOR USER CONTROL AND EXCLUSION OF CRYPTOGRAPHIC TOKENIZED DATA

Simplified Explanation

The invention involves creating cryptographic tokens from received records, encrypting the records, generating a cryptographic token based on the encrypted payload, and committing it to a blockchain.

  • The system receives a request with multiple records.
  • It encrypts the records into an encrypted payload.
  • It generates a cryptographic token based on the encrypted payload.
  • The cryptographic token is then added to a blockchain.

Potential Applications

This technology could be applied in various industries such as finance, healthcare, supply chain management, and cybersecurity for secure data storage and verification.

Problems Solved

This technology solves the problem of secure data transmission and storage, ensuring the integrity and authenticity of records through cryptographic tokens.

Benefits

The benefits of this technology include enhanced data security, tamper-proof records, efficient verification processes, and increased trust in the integrity of data.

Potential Commercial Applications

  • Secure data storage solutions
  • Blockchain-based authentication systems
  • Supply chain management platforms

Possible Prior Art

One possible prior art could be the use of cryptographic tokens in blockchain technology for data verification and security.

Unanswered Questions

How does this technology ensure the authenticity of the records being stored and verified?

This technology ensures authenticity through the encryption of records into cryptographic tokens, which are then committed to a blockchain, providing a secure and tamper-proof method of verification.

What are the potential limitations or vulnerabilities of using cryptographic tokens for data security?

Some potential limitations or vulnerabilities could include the risk of key exposure, potential weaknesses in encryption algorithms, and the need for secure key management practices to prevent unauthorized access to the data.


Original Abstract Submitted

The invention relates to generating cryptographic tokens based on received records. The system may receive a blockchain operation request comprising a plurality of records, encrypt a plurality of records into an encrypted payload, generate a cryptographic token based on the encrypted payload, and cause the cryptographic token to be committed to a blockchain.