Oracle international corporation (20240126919). PORTABLE ACCESS POINT FOR SECURE USER INFORMATION USING NON-FUNGIBLE TOKENS simplified abstract
Contents
- 1 PORTABLE ACCESS POINT FOR SECURE USER INFORMATION USING NON-FUNGIBLE TOKENS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 PORTABLE ACCESS POINT FOR SECURE USER INFORMATION USING NON-FUNGIBLE TOKENS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
PORTABLE ACCESS POINT FOR SECURE USER INFORMATION USING NON-FUNGIBLE TOKENS
Organization Name
oracle international corporation
Inventor(s)
Zachary S. Ankrom of Austin TX (US)
Kamran Khaliq of Ashburn VA (US)
PORTABLE ACCESS POINT FOR SECURE USER INFORMATION USING NON-FUNGIBLE TOKENS - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240126919 titled 'PORTABLE ACCESS POINT FOR SECURE USER INFORMATION USING NON-FUNGIBLE TOKENS
Simplified Explanation
The patent application abstract describes a system that allows users to control access to their secure information using non-fungible tokens (NFTs). Users can register with a secure information manager and set specific access permissions for vetted entities. These entities can then request access to the user's information by scanning a portable access point and presenting a credential in the form of an NFT. The secure information manager can then grant limited access based on the permissions assigned to the NFT.
- Users can control access to their secure information using non-fungible tokens (NFTs)
- Vetted entities can request access to the user's information through a portable access point and NFT credential
- The secure information manager grants limited access based on the permissions assigned to the NFT
Potential Applications
The technology described in the patent application could be applied in various industries such as healthcare, finance, and data security where controlled access to sensitive information is crucial.
Problems Solved
This technology solves the problem of unauthorized access to secure information by allowing users to set specific access permissions for vetted entities using NFTs.
Benefits
The benefits of this technology include enhanced security, increased control over access to sensitive information, and improved privacy protection for users.
Potential Commercial Applications
The technology could be commercially applied in industries that deal with sensitive information such as healthcare providers, financial institutions, and data management companies.
Possible Prior Art
One possible prior art could be the use of access control lists (ACLs) in computer systems to manage permissions for users and entities accessing sensitive information.
What are the technical specifications of the portable access point mentioned in the abstract?
The technical specifications of the portable access point, such as its size, weight, battery life, and connectivity options, are not detailed in the abstract. Further information would be needed to understand how the portable access point functions and how it interacts with the secure information manager.
How are the access privileges assigned to the NFTs in the system?
The abstract mentions that access privileges are assigned to the NFTs that correspond to the user's selections. However, the specific process of assigning these access privileges to the NFTs is not detailed. Further information would be required to understand how the system determines and assigns access privileges to the NFTs.
Original Abstract Submitted
embodiments permit scope limited access to a user's secure information using non-fungible tokens (nfts). a user can register with a secure information manager and control the scope with which the user's secure information is shared. for example, the user can permit a vetted entity access to the user's secure information via a portable access point. the user can select scope definition that control how the user's secure information is shared with the vetted entity. the vetted entity can scan the user's portable access point and request a credential. the credential can be a nft that is assigned access privileges that correspond the user's selections. the vetted entity can then issue data access request(s) using the credential. the secure information manager can permit the vetted entity scope limited access to the user's secure information that corresponds to the access privileges assigned to the nft.