18182919. PORTABLE ACCESS POINT FOR SECURE USER INFORMATION USING NON-FUNGIBLE TOKENS simplified abstract (Oracle International Corporation)

From WikiPatents
Jump to navigation Jump to search

PORTABLE ACCESS POINT FOR SECURE USER INFORMATION USING NON-FUNGIBLE TOKENS

Organization Name

Oracle International Corporation

Inventor(s)

Zachary S. Ankrom of Austin TX (US)

Kamran Khaliq of Ashburn VA (US)

PORTABLE ACCESS POINT FOR SECURE USER INFORMATION USING NON-FUNGIBLE TOKENS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18182919 titled 'PORTABLE ACCESS POINT FOR SECURE USER INFORMATION USING NON-FUNGIBLE TOKENS

Simplified Explanation

Embodiments permit scope limited access to a user's secure information using non-fungible tokens (NFTs). A user can register with a secure information manager and control the scope with which the user's secure information is shared. For example, the user can permit a vetted entity access to the user's secure information via a portable access point. The user can select scope definition that control how the user's secure information is shared with the vetted entity. The vetted entity can scan the user's portable access point and request a credential. The credential can be a NFT that is assigned access privileges that correspond the user's selections. The vetted entity can then issue data access request(s) using the credential. The secure information manager can permit the vetted entity scope limited access to the user's secure information that corresponds to the access privileges assigned to the NFT.

  • Secure information access control using non-fungible tokens (NFTs)
  • User registers with secure information manager
  • User controls scope of access to secure information
  • Vetted entity can access user's information via portable access point
  • Credential in the form of NFT assigned access privileges
  • Secure information manager grants access based on NFT privileges

Potential Applications

The technology can be applied in:

  • Healthcare for securely sharing patient information with authorized healthcare providers
  • Financial services for granting access to financial data to approved institutions

Problems Solved

  • Ensures secure sharing of sensitive information
  • Allows users to control and monitor access to their data

Benefits

  • Enhanced data security and privacy
  • Streamlined access control process
  • Increased trust between users and entities accessing their information

Potential Commercial Applications

  • Data management platforms
  • Secure communication tools

Possible Prior Art

One possible prior art could be the use of access control lists (ACLs) in computer systems to manage permissions for users and entities accessing data.

What are the technical specifications of the NFTs used for access control in this system?

The technical specifications of the NFTs, such as the encryption algorithms used, the token format, and the access control mechanisms implemented, are not detailed in the abstract. Further information on the technical aspects of the NFTs would be needed to understand the implementation of the access control system.

How does the system handle revoking access to secure information once it has been granted?

The abstract does not mention the process of revoking access to secure information once it has been granted to a vetted entity. Understanding the mechanism for revoking access rights would be crucial in ensuring data security and privacy compliance.


Original Abstract Submitted

Embodiments permit scope limited access to a user's secure information using non-fungible tokens (NFTs). A user can register with a secure information manager and control the scope with which the user's secure information is shared. For example, the user can permit a vetted entity access to the user's secure information via a portable access point. The user can select scope definition that control how the user's secure information is shared with the vetted entity. The vetted entity can scan the user's portable access point and request a credential. The credential can be a NFT that is assigned access privileges that correspond the user's selections. The vetted entity can then issue data access request(s) using the credential. The secure information manager can permit the vetted entity scope limited access to the user's secure information that corresponds to the access privileges assigned to the NFT.