18489129. Access Manager That Limits Access to User Information Using Authentication and Verification simplified abstract (Oracle International Corporation)

From WikiPatents
Jump to navigation Jump to search

Access Manager That Limits Access to User Information Using Authentication and Verification

Organization Name

Oracle International Corporation

Inventor(s)

Zachary S. Ankrom of Austin TX (US)

Kamran Khaliq of Ashburn VA (US)

Access Manager That Limits Access to User Information Using Authentication and Verification - A simplified explanation of the abstract

This abstract first appeared for US patent application 18489129 titled 'Access Manager That Limits Access to User Information Using Authentication and Verification

Simplified Explanation

Embodiments permit scope limited access to a user's secure information using credential authentication and user information verification. Certain information sharing protocols can require an explicit grant to share a user's secure information with a requesting entity. In some scenarios such an explicit grant may be impractical, such as when the user is not available to provide such an explicit grant. Embodiments of a secure information manager can permit a vetted entity scope and time limited access to a user's secure information in such scenarios, for example when the vetted entity provides an assertion that the user is unable to provide an explicit grant. For example, in scenario(s) with exigent circumstances, the secure information manager can permit the vetted entity to access a limited scope of user information that corresponds to the vetted entity's relationship to the user, role in a workflow, or other suitable characteristics of the vetted entity.

  • Secure information manager allows limited access to user's secure information
  • Vetted entity can access information in scenarios where explicit grant is impractical
  • Access is scope and time limited based on vetted entity's characteristics

Potential Applications

This technology could be applied in healthcare settings where quick access to patient information is needed in emergency situations. It could also be used in legal or financial industries where sensitive data must be accessed under specific circumstances.

Problems Solved

This technology solves the problem of needing access to secure information when the user is unavailable to provide explicit permission. It also addresses the issue of maintaining privacy and security while allowing limited access to sensitive data.

Benefits

The benefits of this technology include improved efficiency in accessing necessary information, increased security by limiting access to only vetted entities, and enhanced privacy protection for users.

Potential Commercial Applications

Potential commercial applications of this technology could include integration into secure data management systems for various industries such as healthcare, finance, legal, and government agencies.

Possible Prior Art

One possible prior art for this technology could be existing secure data access systems that require explicit user permission for data sharing. Another could be access control systems that limit information access based on user roles or permissions.

Unanswered Questions

== How does this technology handle potential security risks associated with granting access to vetted entities? This article does not delve into the specific security measures implemented to mitigate risks when providing limited access to secure information.

== What are the specific criteria for vetting entities to ensure they are trustworthy and authorized to access the user's information? The article does not provide details on the vetting process or criteria used to determine which entities are eligible to access the user's secure information in certain scenarios.


Original Abstract Submitted

Embodiments permit scope limited access to a user's secure information using credential authentication and user information verification. Certain information sharing protocols can require an explicit grant to share a user's secure information with a requesting entity. In some scenarios such an explicit grant may be impractical, such as when the user is not available to provide such an explicit grant. Embodiments of a secure information manager can permit a vetted entity scope and time limited access to a user's secure information in such scenarios, for example when the vetted entity provides an assertion that the user is unable to provide an explicit grant. For example, in scenario(s) with exigent circumstances, the secure information manager can permit the vetted entity to access a limited scope of user information that corresponds to the vetted entity's relationship to the user, role in a workflow, or other suitable characteristics of the vetted entity.