Oracle international corporation (20240126922). Access Manager That Limits Access to User Information Using Authentication and Verification simplified abstract
Contents
- 1 Access Manager That Limits Access to User Information Using Authentication and Verification
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 Access Manager That Limits Access to User Information Using Authentication and Verification - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
Access Manager That Limits Access to User Information Using Authentication and Verification
Organization Name
oracle international corporation
Inventor(s)
Zachary S. Ankrom of Austin TX (US)
Kamran Khaliq of Ashburn VA (US)
Access Manager That Limits Access to User Information Using Authentication and Verification - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240126922 titled 'Access Manager That Limits Access to User Information Using Authentication and Verification
Simplified Explanation
Embodiments permit scope limited access to a user's secure information using credential authentication and user information verification. Certain information sharing protocols can require an explicit grant to share a user's secure information with a requesting entity. In some scenarios, such an explicit grant may be impractical, such as when the user is not available to provide such an explicit grant. Embodiments of a secure information manager can permit a vetted entity scope and time-limited access to a user's secure information in such scenarios, for example when the vetted entity provides an assertion that the user is unable to provide an explicit grant. For example, in scenarios with exigent circumstances, the secure information manager can permit the vetted entity to access a limited scope of user information that corresponds to the vetted entity's relationship to the user, role in a workflow, or other suitable characteristics of the vetted entity.
- Secure information manager allows limited access to user's secure information
- Access granted based on vetted entity's assertion in scenarios where explicit grant is impractical
- Limited scope of user information accessed based on vetted entity's relationship to the user or role in a workflow
Potential Applications
This technology could be applied in industries where secure information sharing is crucial, such as healthcare, finance, and government sectors.
Problems Solved
This technology solves the problem of accessing a user's secure information in scenarios where obtaining an explicit grant is not feasible, ensuring that only vetted entities with valid reasons can access the information.
Benefits
The benefits of this technology include enhanced security and privacy for users, efficient information sharing in emergency situations, and streamlined workflows for authorized entities.
Potential Commercial Applications
Potential commercial applications of this technology include secure data sharing platforms, identity verification services, and compliance management systems.
Possible Prior Art
One possible prior art could be secure data access control systems that require explicit user authorization for information sharing.
Original Abstract Submitted
embodiments permit scope limited access to a user's secure information using credential authentication and user information verification. certain information sharing protocols can require an explicit grant to share a user's secure information with a requesting entity. in some scenarios such an explicit grant may be impractical, such as when the user is not available to provide such an explicit grant. embodiments of a secure information manager can permit a vetted entity scope and time limited access to a user's secure information in such scenarios, for example when the vetted entity provides an assertion that the user is unable to provide an explicit grant. for example, in scenario(s) with exigent circumstances, the secure information manager can permit the vetted entity to access a limited scope of user information that corresponds to the vetted entity's relationship to the user, role in a workflow, or other suitable characteristics of the vetted entity.