Oracle international corporation (20240126922). Access Manager That Limits Access to User Information Using Authentication and Verification simplified abstract

From WikiPatents
Revision as of 03:06, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Access Manager That Limits Access to User Information Using Authentication and Verification

Organization Name

oracle international corporation

Inventor(s)

Zachary S. Ankrom of Austin TX (US)

Kamran Khaliq of Ashburn VA (US)

Access Manager That Limits Access to User Information Using Authentication and Verification - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240126922 titled 'Access Manager That Limits Access to User Information Using Authentication and Verification

Simplified Explanation

Embodiments permit scope limited access to a user's secure information using credential authentication and user information verification. Certain information sharing protocols can require an explicit grant to share a user's secure information with a requesting entity. In some scenarios, such an explicit grant may be impractical, such as when the user is not available to provide such an explicit grant. Embodiments of a secure information manager can permit a vetted entity scope and time-limited access to a user's secure information in such scenarios, for example when the vetted entity provides an assertion that the user is unable to provide an explicit grant. For example, in scenarios with exigent circumstances, the secure information manager can permit the vetted entity to access a limited scope of user information that corresponds to the vetted entity's relationship to the user, role in a workflow, or other suitable characteristics of the vetted entity.

  • Secure information manager allows limited access to user's secure information
  • Access granted based on vetted entity's assertion in scenarios where explicit grant is impractical
  • Limited scope of user information accessed based on vetted entity's relationship to the user or role in a workflow

Potential Applications

This technology could be applied in industries where secure information sharing is crucial, such as healthcare, finance, and government sectors.

Problems Solved

This technology solves the problem of accessing a user's secure information in scenarios where obtaining an explicit grant is not feasible, ensuring that only vetted entities with valid reasons can access the information.

Benefits

The benefits of this technology include enhanced security and privacy for users, efficient information sharing in emergency situations, and streamlined workflows for authorized entities.

Potential Commercial Applications

Potential commercial applications of this technology include secure data sharing platforms, identity verification services, and compliance management systems.

Possible Prior Art

One possible prior art could be secure data access control systems that require explicit user authorization for information sharing.


Original Abstract Submitted

embodiments permit scope limited access to a user's secure information using credential authentication and user information verification. certain information sharing protocols can require an explicit grant to share a user's secure information with a requesting entity. in some scenarios such an explicit grant may be impractical, such as when the user is not available to provide such an explicit grant. embodiments of a secure information manager can permit a vetted entity scope and time limited access to a user's secure information in such scenarios, for example when the vetted entity provides an assertion that the user is unable to provide an explicit grant. for example, in scenario(s) with exigent circumstances, the secure information manager can permit the vetted entity to access a limited scope of user information that corresponds to the vetted entity's relationship to the user, role in a workflow, or other suitable characteristics of the vetted entity.