Oracle International Corporation (20240330508). Manager For Ingesting Secure User Information and Permitting Scope Limited Access simplified abstract

From WikiPatents
Revision as of 11:45, 8 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Manager For Ingesting Secure User Information and Permitting Scope Limited Access

Organization Name

Oracle International Corporation

Inventor(s)

Zachary S. Ankrom of Austin TX (US)

Kamran Khaliq of Ashburn VA (US)

Manager For Ingesting Secure User Information and Permitting Scope Limited Access - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240330508 titled 'Manager For Ingesting Secure User Information and Permitting Scope Limited Access

Abstract: Embodiments permit scope limited access to a user's secure information using blockchain-backed credentials. A user can register with a secure information manager and control the scope with which the user's secure information is shared. For example, the user can permit a vetted entity access to the user's secure information via a portable access point. The user can select scope definitions that control how the user's secure information is shared. The vetted entity can scan the user's portable access point and request a credential. The vetted entity can then issue data access requests using the credential. The secure information manager can permit the vetted entity scope limited access to the user's secure information that corresponds to the access privileges assigned to the credential. The secure user information managed by the secure information manager can be received or retrieved from multiple sources and ingested/organized according to a multidimensional data schema.

  • Simplified Explanation:

- Users can control access to their secure information using blockchain-backed credentials. - Vetted entities can request access to user information through portable access points. - Secure information managers manage access privileges based on credentials.

  • Key Features and Innovation:

- Blockchain-backed credentials for secure information access. - User-controlled scope definitions for sharing information. - Portable access points for vetted entities to request access. - Secure information manager manages access privileges based on credentials. - Multidimensional data schema for organizing user information.

  • Potential Applications:

- Secure data sharing in healthcare. - Controlled access to financial information. - Secure communication in government agencies.

  • Problems Solved:

- Lack of control over secure information sharing. - Difficulty in managing access privileges. - Inefficient data organization.

  • Benefits:

- Enhanced security for user information. - Improved control over data access. - Efficient organization of secure information.

  • Commercial Applications:

- Secure data sharing platforms for businesses. - Access control systems for sensitive information. - Compliance management tools for regulatory requirements.

  • Questions about Secure Information Management:

1. How does blockchain technology enhance the security of user information? 2. What are the potential risks associated with granting access to vetted entities through portable access points?

  • Frequently Updated Research:

- Ongoing research on blockchain technology for secure data management. - Studies on the impact of user-controlled access privileges on data security.


Original Abstract Submitted

embodiments permit scope limited access to a user's secure information using blockchain backed credential(s). a user can register with a secure information manager and control the scope with which the user's secure information is shared. for example, the user can permit a vetted entity access to the user's secure information via a portable access point. the user can select scope definition that control how the user's secure information is shared. the vetted entity can scan the user's portable access point and request a credential. the vetted entity can then issue data access request(s) using the credential. the secure information manager can permit the vetted entity scope limited access to the user's secure information that corresponds to the access privileges assigned to the credential. the secure user information managed by the secure information manager can be received or retrieved from multiple sources and ingested/organized according to a multidimensional data schema.