18489107. Portable Access Point for Secure User Information Using a Blockchain Backed Credential simplified abstract (Oracle International Corporation)

From WikiPatents
Revision as of 06:33, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Portable Access Point for Secure User Information Using a Blockchain Backed Credential

Organization Name

Oracle International Corporation

Inventor(s)

Zachary S. Ankrom of Austin TX (US)

Kamran Khaliq of Ashburn VA (US)

Portable Access Point for Secure User Information Using a Blockchain Backed Credential - A simplified explanation of the abstract

This abstract first appeared for US patent application 18489107 titled 'Portable Access Point for Secure User Information Using a Blockchain Backed Credential

Simplified Explanation

Embodiments permit scope limited access to a user's secure information using blockchain backed credential(s). A user can register with a secure information manager and control the scope with which the user's secure information is shared. For example, the user can permit a vetted entity access to the user's secure information via a portable access point. The user can select scope definition that control how the user's secure information is shared with the vetted entity. The vetted entity can scan the user's portable access point and request a credential. The credential can be a blockchain backed credential that is assigned access privileges that correspond the user's selections. The vetted entity can then issue data access request(s) using the credential. The secure information manager can permit the vetted entity scope limited access to the user's secure information that corresponds to the access privileges assigned to the credential.

  • User can control access to their secure information using blockchain backed credentials.
  • Vetted entities can request access to user's information through a portable access point.
  • Access privileges are assigned to credentials based on user's selections.
  • Secure information manager grants access to vetted entities based on credential privileges.

Potential Applications

This technology could be applied in various industries such as healthcare, finance, and government where secure information sharing is crucial.

Problems Solved

This technology solves the problem of unauthorized access to sensitive information by allowing users to control and monitor access through blockchain credentials.

Benefits

The benefits of this technology include enhanced security, increased privacy control, and efficient sharing of secure information with trusted entities.

Potential Commercial Applications

One potential commercial application of this technology could be in the development of secure data sharing platforms for businesses and organizations.

Possible Prior Art

One possible prior art could be the use of traditional access control systems in managing data access, which may not offer the same level of security and control as blockchain-backed credentials.

Unanswered Questions

How does this technology ensure the authenticity of the vetted entities requesting access to secure information?

The article does not provide details on the verification process for vetted entities using the portable access point and requesting credentials.

What measures are in place to prevent unauthorized access to the user's secure information through the blockchain-backed credentials?

The article does not mention specific security features or protocols implemented to prevent unauthorized access to the user's secure information.


Original Abstract Submitted

Embodiments permit scope limited access to a user's secure information using blockchain backed credential(s). A user can register with a secure information manager and control the scope with which the user's secure information is shared. For example, the user can permit a vetted entity access to the user's secure information via a portable access point. The user can select scope definition that control how the user's secure information is shared with the vetted entity. The vetted entity can scan the user's portable access point and request a credential. The credential can be a blockchain backed credential that is assigned access privileges that correspond the user's selections. The vetted entity can then issue data access request(s) using the credential. The secure information manager can permit the vetted entity scope limited access to the user's secure information that corresponds to the access privileges assigned to the credential.