Dell products l.p. (20240346163). PROCESSING TRANSACTIONS USING NESTED DATA OBJECTS simplified abstract

From WikiPatents
Revision as of 02:16, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

PROCESSING TRANSACTIONS USING NESTED DATA OBJECTS

Organization Name

dell products l.p.

Inventor(s)

Shibi Panikkar of Bangalore (IN)

PROCESSING TRANSACTIONS USING NESTED DATA OBJECTS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240346163 titled 'PROCESSING TRANSACTIONS USING NESTED DATA OBJECTS

Simplified Explanation

The patent application describes methods, apparatus, and storage media for processing transactions using nested data objects. These objects contain layers with hash values and private keys for verification and encryption based on user access.

  • Nested data objects for processing transactions
  • Layers with hash values and private keys for verification
  • Encryption based on user access specified
  • Transmitting nested data objects to user devices
  • Verifiable transactions based on hash values

Key Features and Innovation

  • Generation of nested data objects for files
  • Addition of layers for additional transactions
  • Encryption based on user access type
  • Verifiable transactions using hash values
  • Private keys for security

Potential Applications

This technology can be applied in various industries such as finance, healthcare, and legal sectors for secure transaction processing and data management.

Problems Solved

This technology addresses the need for secure and verifiable transactions, ensuring data integrity and confidentiality in a user-friendly manner.

Benefits

  • Enhanced security for transactions
  • Efficient data management
  • User-friendly encryption methods
  • Verifiable and secure transactions
  • Customized access control

Commercial Applications

"Secure Transaction Processing Technology for Various Industries"

This technology can be used in financial institutions, healthcare organizations, and legal firms for secure transaction processing, data management, and access control.

Prior Art

Further research can be conducted in the field of secure transaction processing and data encryption to explore existing technologies and innovations.

Frequently Updated Research

Stay updated on advancements in secure transaction processing, data encryption, and access control technologies to enhance the efficiency and security of transactions.

Questions about Secure Transaction Processing Technology

How does this technology improve data security in transactions?

This technology enhances data security by encrypting nested data objects with layers containing hash values and private keys for verification and access control.

What industries can benefit from this secure transaction processing technology?

Industries such as finance, healthcare, and legal sectors can benefit from this technology for secure transaction processing, data management, and access control.


Original Abstract Submitted

methods, apparatus, and processor-readable storage media for processing transactions using nested data objects are provided herein. an example computer-implemented method includes: generating a nested data object corresponding to a file, where the nested data object includes a first layer for a first transaction related to the file; adding, for each of one or more additional transactions related to the file, a corresponding additional layer to the nested data object, where each layer of the nested data object include one or more respective hash values and one or more respective private keys; and transmitting the nested data object to a user device, where each layer of the nested object are encrypted based on a type of access specified for a user of the user device, and wherein each of the transactions is verifiable based at last in part on the one or more hash values of the corresponding layer.