17931507. SYSTEMS AND METHODS FOR USER CONTROL AND EXCLUSION OF CRYPTOGRAPHIC TOKENIZED DATA simplified abstract (Capital One Services, LLC)
Contents
- 1 SYSTEMS AND METHODS FOR USER CONTROL AND EXCLUSION OF CRYPTOGRAPHIC TOKENIZED DATA
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SYSTEMS AND METHODS FOR USER CONTROL AND EXCLUSION OF CRYPTOGRAPHIC TOKENIZED DATA - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
SYSTEMS AND METHODS FOR USER CONTROL AND EXCLUSION OF CRYPTOGRAPHIC TOKENIZED DATA
Organization Name
Inventor(s)
Julian Duque of Arlington VA (US)
Purva Shanker of Arlington VA (US)
Samuel Rapowitz of Roswell GA (US)
Dennis Liu of Richmond VA (US)
SYSTEMS AND METHODS FOR USER CONTROL AND EXCLUSION OF CRYPTOGRAPHIC TOKENIZED DATA - A simplified explanation of the abstract
This abstract first appeared for US patent application 17931507 titled 'SYSTEMS AND METHODS FOR USER CONTROL AND EXCLUSION OF CRYPTOGRAPHIC TOKENIZED DATA
Simplified Explanation
The invention involves creating cryptographic tokens from received records, encrypting the records, generating a cryptographic token based on the encrypted payload, and committing it to a blockchain.
- The system receives a request with multiple records.
- It encrypts the records into an encrypted payload.
- It generates a cryptographic token based on the encrypted payload.
- The cryptographic token is then added to a blockchain.
Potential Applications
This technology could be applied in various industries such as finance, healthcare, supply chain management, and cybersecurity for secure data storage and verification.
Problems Solved
This technology solves the problem of secure data transmission and storage, ensuring the integrity and authenticity of records through cryptographic tokens.
Benefits
The benefits of this technology include enhanced data security, tamper-proof records, efficient verification processes, and increased trust in the integrity of data.
Potential Commercial Applications
- Secure data storage solutions
- Blockchain-based authentication systems
- Supply chain management platforms
Possible Prior Art
One possible prior art could be the use of cryptographic tokens in blockchain technology for data verification and security.
Unanswered Questions
How does this technology ensure the authenticity of the records being stored and verified?
This technology ensures authenticity through the encryption of records into cryptographic tokens, which are then committed to a blockchain, providing a secure and tamper-proof method of verification.
What are the potential limitations or vulnerabilities of using cryptographic tokens for data security?
Some potential limitations or vulnerabilities could include the risk of key exposure, potential weaknesses in encryption algorithms, and the need for secure key management practices to prevent unauthorized access to the data.
Original Abstract Submitted
The invention relates to generating cryptographic tokens based on received records. The system may receive a blockchain operation request comprising a plurality of records, encrypt a plurality of records into an encrypted payload, generate a cryptographic token based on the encrypted payload, and cause the cryptographic token to be committed to a blockchain.