Capital one services, llc (20240113881). AUTHORIZED USERS AND EXPERIENCES AUTHENTICATED/MANAGED BY NON-FUNGIBLE TOKEN (NFT) OWNERSHIP simplified abstract
Contents
- 1 AUTHORIZED USERS AND EXPERIENCES AUTHENTICATED/MANAGED BY NON-FUNGIBLE TOKEN (NFT) OWNERSHIP
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 AUTHORIZED USERS AND EXPERIENCES AUTHENTICATED/MANAGED BY NON-FUNGIBLE TOKEN (NFT) OWNERSHIP - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
AUTHORIZED USERS AND EXPERIENCES AUTHENTICATED/MANAGED BY NON-FUNGIBLE TOKEN (NFT) OWNERSHIP
Organization Name
Inventor(s)
Imren Johar of Clifton VA (US)
Dennis Sean Brennan of Pleasanton CA (US)
Kevin Osborn of Newton Highlands MA (US)
AUTHORIZED USERS AND EXPERIENCES AUTHENTICATED/MANAGED BY NON-FUNGIBLE TOKEN (NFT) OWNERSHIP - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240113881 titled 'AUTHORIZED USERS AND EXPERIENCES AUTHENTICATED/MANAGED BY NON-FUNGIBLE TOKEN (NFT) OWNERSHIP
Simplified Explanation
The patent application describes a method and system for authorizing limited user access to resources of other users using NFTs. The system utilizes a resource access system to authorize access by receiving a request, obtaining an encrypted payload from a blockchain node, transmitting a command to decrypt the payload, and verifying access parameters before allowing the requested action to be performed.
- The system uses NFTs to authorize limited user access to resources.
- Access is granted based on encrypted payloads obtained from a blockchain.
- The system verifies access parameters before allowing requested actions to be performed.
Potential Applications
The technology described in this patent application could be applied in various industries such as:
- Digital asset management
- Secure data sharing platforms
- Access control systems
Problems Solved
This technology addresses the following issues:
- Ensuring secure access to resources
- Managing permissions for limited user access
- Verifying user identity and access parameters
Benefits
The benefits of this technology include:
- Enhanced security for resource access
- Streamlined authorization process
- Improved control over user permissions
Potential Commercial Applications
A potential commercial application for this technology could be in:
- Secure file sharing platforms
- Access control systems for sensitive data
- Digital rights management solutions
Possible Prior Art
One possible prior art for this technology could be:
- Blockchain-based access control systems
- Cryptography-based authorization methods
What are the potential limitations of this technology in real-world applications?
The potential limitations of this technology in real-world applications could include:
- Compatibility issues with existing systems
- Scalability challenges for large-scale implementations
How does this technology compare to traditional access control methods?
This technology offers a more secure and decentralized approach to access control compared to traditional methods. By leveraging blockchain technology and NFTs, it provides a more robust and tamper-proof authorization process.
Original Abstract Submitted
methods and systems are described herein for authorizing limited user access to resources of other users using nfts. a resource access system may be used to authorize access. the system may receive a first request for performing an action using a resource associated with a first user, and in response to the first request, obtain an encrypted payload from a blockchain node of a blockchain. the system may transmit a command to the second device to decrypt the encrypted payload using the second cryptography-based storage application and receive the access token and the one or more access parameters from the second device. in response to determining that metadata of the first request matches the one or more access parameters of the access token, the system may transmit a request to perform the action.