MX2021005659A - Gestión de permisos para acceder a datos de usuario en una red de confianza de registro distribuido. - Google Patents
Gestión de permisos para acceder a datos de usuario en una red de confianza de registro distribuido.Info
- Publication number
- MX2021005659A MX2021005659A MX2021005659A MX2021005659A MX2021005659A MX 2021005659 A MX2021005659 A MX 2021005659A MX 2021005659 A MX2021005659 A MX 2021005659A MX 2021005659 A MX2021005659 A MX 2021005659A MX 2021005659 A MX2021005659 A MX 2021005659A
- Authority
- MX
- Mexico
- Prior art keywords
- user data
- access
- user
- distributed ledger
- users
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1076—Resource dissemination mechanisms or network resource keeping policies for optimal resource availability in the overlay network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Economics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Se describen mecanismos para gestionar permisos para acceder a datos de usuario en una red de confianza de registro distribuido ("DLTN"). Un usuario dado puede compartir acceso a datos de usuario de una manera detallada. El acceso a los datos de usuario puede depender de la categoría de datos de usuario y/o el papel de otro usuario (por ejemplo, si el otro usuario se reconoce como una conexión). El acceso a los datos de usuario puede tener una duración limitada. Los permisos para acceder a datos de usuario se pueden establecer de forma proactiva o reactiva. Un protocolo permite que un revisor potencial solicite acceso a los datos de usuario de un usuario dado, con el usuario dado aprobando o rechazando selectivamente el acceso por parte del revisor. De esta manera, un usuario dado puede controlar el acceso a los datos de usuario en la DLTN, otorgando selectivamente (o revocando) acceso a algunos de los datos de usuario o todos los datos de usuario, por parte de otros usuarios seleccionados o por todos los demás usuarios.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201862760789P | 2018-11-13 | 2018-11-13 | |
| PCT/US2019/061008 WO2020102246A1 (en) | 2018-11-13 | 2019-11-12 | Managing permissions to access user data in a distributed ledger trust network |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MX2021005659A true MX2021005659A (es) | 2021-09-10 |
Family
ID=70730834
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MX2021005658A MX2021005658A (es) | 2018-11-13 | 2019-11-12 | Definición y gestión de formularios en una red de confianza de libro mayor distribuido. |
| MX2021005659A MX2021005659A (es) | 2018-11-13 | 2019-11-12 | Gestión de permisos para acceder a datos de usuario en una red de confianza de registro distribuido. |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MX2021005658A MX2021005658A (es) | 2018-11-13 | 2019-11-12 | Definición y gestión de formularios en una red de confianza de libro mayor distribuido. |
Country Status (9)
| Country | Link |
|---|---|
| US (2) | US12113781B2 (es) |
| EP (2) | EP3881270A4 (es) |
| CN (2) | CN113287141B (es) |
| BR (2) | BR112021008817A2 (es) |
| CO (2) | CO2021007712A2 (es) |
| MX (2) | MX2021005658A (es) |
| PH (2) | PH12021551089A1 (es) |
| WO (2) | WO2020102246A1 (es) |
| ZA (2) | ZA202103185B (es) |
Families Citing this family (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12184781B2 (en) | 2017-07-10 | 2024-12-31 | Burstiq, Inc. | Systems and methods for accessing digital assets in a blockchain using owner consent contracts |
| US11729175B2 (en) * | 2019-04-25 | 2023-08-15 | Comcast Cable Communications, Llc | Blockchain folding |
| GB201913144D0 (en) * | 2019-09-12 | 2019-10-30 | Nchain Holdings Ltd | Sharing data via transactions of a blockchain |
| US12143520B2 (en) * | 2019-11-19 | 2024-11-12 | Consensys Software Inc. | Network multi-tenant architecture for distributed ledger systems |
| US11769577B1 (en) | 2020-01-15 | 2023-09-26 | Ledgerdomain Inc. | Decentralized identity authentication framework for distributed data |
| US12105842B1 (en) | 2020-01-15 | 2024-10-01 | Ledgerdomain Inc. | Verifiable credentialling and message content provenance authentication |
| US11081219B1 (en) | 2020-01-15 | 2021-08-03 | Ledgerdomain Inc. | Secure messaging in a machine learning blockchain network |
| FR3107417A1 (fr) * | 2020-02-19 | 2021-08-20 | Orange | Procédé et dispositif de contrôle d’accès à une fonction d’une application inscrite dans une chaîne de blocs. |
| WO2021211027A1 (en) * | 2020-04-17 | 2021-10-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Resource sharing for cooperative communications |
| US12105833B2 (en) * | 2020-04-22 | 2024-10-01 | T-Mobile Usa, Inc. | Blockchain-based subscriber data protection and access |
| US11539787B2 (en) | 2020-04-30 | 2022-12-27 | T-Mobile Usa, Inc. | 5G enabled massively distributed on-demand personal cloud system and method |
| US11418587B2 (en) * | 2020-04-30 | 2022-08-16 | T-Mobile Usa, Inc. | 5G on-demand dynamically instantiated blockchain for highly distributed peer-to-peer consumer cloud |
| US12143395B2 (en) * | 2020-05-05 | 2024-11-12 | International Business Machines Corporation | Low trust privileged access management |
| GB2595216A (en) * | 2020-05-15 | 2021-11-24 | Nchain Holdings Ltd | Multi-layer communication network |
| WO2022046524A1 (en) * | 2020-08-24 | 2022-03-03 | Burstiq, Inc. | Systems and methods for accessing digital assets in a blockchain using owner consent contracts |
| US11651096B2 (en) * | 2020-08-24 | 2023-05-16 | Burstiq, Inc. | Systems and methods for accessing digital assets in a blockchain using global consent contracts |
| US11748303B2 (en) * | 2020-11-23 | 2023-09-05 | Ford Global Technologies, Llc | Systems and methods for remote storage of information associated with a distributed ledger network |
| US12236222B2 (en) * | 2020-12-30 | 2025-02-25 | Accenture Global Solutions Limited | Scalable, robust, and secure multi-tenant edge architecture for mission-critical applications |
| CN114492351B (zh) * | 2021-09-23 | 2024-10-22 | 中国电力科学研究院有限公司 | 一种用于业务流程处理的智能加密表单构造方法及系统 |
| US12067132B2 (en) * | 2021-12-23 | 2024-08-20 | Oracle International Corporation | Just-in-time data object permission restriction |
| US12189796B2 (en) | 2021-12-23 | 2025-01-07 | Oracle International Corporation | Just-in-time data object permission restriction and action implementation |
| US12526127B2 (en) * | 2022-08-31 | 2026-01-13 | Beijing Boe Technology Development Co., Ltd. | Resource distribution method and apparatus |
| US12401510B2 (en) * | 2022-09-12 | 2025-08-26 | Capital One Services, Llc | Systems and methods for user control and exclusion of cryptographic tokenized data |
| US11736290B1 (en) | 2022-11-07 | 2023-08-22 | Ledgerdomain Inc. | Management of recipient credentials leveraging private keys on keystores read by provisioned devices |
| US11741215B1 (en) | 2022-11-07 | 2023-08-29 | Ledgerdomain Inc. | Recipient credentialing leveraging private keys on keystores read by provisioned devices |
| US11741216B1 (en) | 2022-11-07 | 2023-08-29 | Ledgerdomain Inc. | Credential revocation leveraging private keys on keystores read by provisioned devices |
| US11848754B1 (en) | 2022-11-07 | 2023-12-19 | Ledgerdomain Inc. | Access delegation leveraging private keys on keystores read by provisioned devices |
| EP4690681A1 (en) * | 2023-04-03 | 2026-02-11 | Verai Systems, LLC | Multiple encryption data storage and retrieval system |
Family Cites Families (57)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7181017B1 (en) * | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
| US20030191703A1 (en) | 2002-02-01 | 2003-10-09 | Ubs Painewebber Inc. | Method and system for providing interested party access to aggregated accounts information |
| US8752197B2 (en) * | 2002-06-18 | 2014-06-10 | International Business Machines Corporation | Application independent system, method, and architecture for privacy protection, enhancement, control, and accountability in imaging service systems |
| JP4434969B2 (ja) * | 2004-01-21 | 2010-03-17 | 株式会社東芝 | コンテンツ提供側システム、ユーザ側システム、追跡システム、装置、方法及びプログラム |
| CA2623137C (en) | 2005-05-13 | 2014-10-21 | Cryptomill Technologies Ltd. | Cryptographic control for mobile storage means |
| US8538980B1 (en) * | 2005-06-15 | 2013-09-17 | Adobe Systems Incorporated | Accessing forms using a metadata registry |
| US7711700B2 (en) * | 2005-11-28 | 2010-05-04 | Commvault Systems, Inc. | Systems and methods for classifying and transferring information in a storage network |
| US8583915B1 (en) | 2007-05-31 | 2013-11-12 | Bby Solutions, Inc. | Security and authentication systems and methods for personalized portable devices and associated systems |
| US7984512B2 (en) * | 2007-06-14 | 2011-07-19 | Microsoft Corporation | Integrating security by obscurity with access control lists |
| US20090002333A1 (en) | 2007-06-22 | 2009-01-01 | Chumby Industries, Inc. | Systems and methods for device registration |
| TW200913710A (en) | 2007-07-13 | 2009-03-16 | Chumby Ind Inc | Systems and methods for alarm tone selection, distribution, and playback in a networked audiovisual device |
| KR101226925B1 (ko) * | 2008-07-21 | 2013-01-28 | 최상혁 | 상품권 결제 방법 |
| CN102291373B (zh) * | 2010-06-15 | 2016-08-31 | 华为技术有限公司 | 元数据文件的更新方法、装置和系统 |
| US8914635B2 (en) * | 2011-07-25 | 2014-12-16 | Grey Heron Technologies, Llc | Method and system for establishing secure communications using composite key cryptography |
| US9336500B2 (en) * | 2011-09-21 | 2016-05-10 | Twilio, Inc. | System and method for authorizing and connecting application developers and users |
| CN102360290A (zh) * | 2011-09-29 | 2012-02-22 | 用友软件股份有限公司 | 表单生成装置和表单生成方法 |
| US9105043B2 (en) | 2012-03-06 | 2015-08-11 | Postrel Richard | Method and system for providing incentives to members of a social network |
| FR2988192B1 (fr) * | 2012-03-19 | 2016-01-01 | Syneria | Procede et systeme de developpement d'applications de consultation de contenus et services sur un reseau de telecommunication, de distribution et d'execution de telles applications sur de multiples appareils. |
| US20140075280A1 (en) * | 2012-09-13 | 2014-03-13 | Sw Development, Llc | Systems and Methods for Transferring Data from an Accessible Database into Forms that Manipulate Databases |
| US20160005032A1 (en) | 2012-11-28 | 2016-01-07 | Hoverkey Ltd. | Method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors |
| US10102510B2 (en) | 2012-11-28 | 2018-10-16 | Hoverkey Ltd. | Method and system of conducting a cryptocurrency payment via a mobile device using a contactless token to store and protect a user's secret key |
| KR101751534B1 (ko) * | 2013-07-05 | 2017-06-28 | 농협은행(주) | 불법적 금융 거래 방지 장치 |
| US20170140375A1 (en) * | 2015-11-15 | 2017-05-18 | Michael Kunstel | System and Method for Permissioned Distributed Block Chain |
| GEP20207163B (en) | 2016-02-08 | 2020-10-12 | Guy Scott | A system and method for document information authenticity verification |
| US20170228252A1 (en) * | 2016-02-10 | 2017-08-10 | Qualcomm Incorporated | System and method for multi-tile data transactions in a system on a chip |
| CA3031133C (en) | 2016-07-18 | 2024-01-16 | Royal Bank Of Canada | Distributed ledger platform for vehicle records |
| US10250694B2 (en) * | 2016-08-19 | 2019-04-02 | Ca, Inc. | Maintaining distributed state among stateless service clients |
| US11657176B2 (en) * | 2016-08-23 | 2023-05-23 | Health Blockchain Convergence, Inc. | Blockchain-based mechanisms for secure health information resource exchange |
| AU2017315345B2 (en) * | 2016-08-23 | 2022-01-06 | BBM Health LLC | Blockchain-based mechanisms for secure health information resource exchange |
| US10402796B2 (en) * | 2016-08-29 | 2019-09-03 | Bank Of America Corporation | Application life-cycle transition record recreation system |
| US20180075677A1 (en) | 2016-09-09 | 2018-03-15 | Tyco Integrated Security, LLC | Architecture for Access Management |
| WO2018057520A1 (en) * | 2016-09-20 | 2018-03-29 | Nant Holdings Ip, Llc | Sample tracking via sample tracking chains, systems and methods |
| US9961155B1 (en) | 2016-12-01 | 2018-05-01 | Dropbox, Inc. | Sharing content via virtual spaces |
| JP7308756B2 (ja) | 2016-12-30 | 2023-07-14 | ビーシー ディベロップメント ラボズ ゲーエムベーハー | ブロックチェーン対応サービスプロバイダシステム |
| US10713368B2 (en) * | 2017-02-02 | 2020-07-14 | Alfresco Software, Inc. | Application of security parameters for content |
| US9992022B1 (en) * | 2017-02-06 | 2018-06-05 | Northern Trust Corporation | Systems and methods for digital identity management and permission controls within distributed network nodes |
| US11321681B2 (en) | 2017-02-06 | 2022-05-03 | Northern Trust Corporation | Systems and methods for issuing and tracking digital tokens within distributed network nodes |
| US10691793B2 (en) * | 2017-02-20 | 2020-06-23 | AlphaPoint | Performance of distributed system functions using a trusted execution environment |
| US11182497B2 (en) | 2017-03-28 | 2021-11-23 | Uniscen | Architectures and systems for managing personal data to be utilized by dynamic sets of external parties |
| US10956582B1 (en) * | 2017-06-13 | 2021-03-23 | Alchemy Limited, LLC | Systems and methods for secure storage of encrypted data on a distributed computing platform, the distributed computing platform being based on a distributed ledger |
| CN107608747B (zh) * | 2017-09-22 | 2021-03-05 | 携程旅游信息技术(上海)有限公司 | 表单系统的构建方法、装置、电子设备、存储介质 |
| US11979490B2 (en) * | 2017-10-24 | 2024-05-07 | 0Chain Corp. | Non-fungible token blockchain processing |
| US11170092B1 (en) * | 2017-12-14 | 2021-11-09 | United Services Automobile Association (Usaa) | Document authentication certification with blockchain and distributed ledger techniques |
| US10701054B2 (en) * | 2018-01-31 | 2020-06-30 | Salesforce.Com, Inc. | Systems, methods, and apparatuses for implementing super community and community sidechains with consent management for distributed ledger technologies in a cloud based computing environment |
| US10628599B2 (en) * | 2018-02-14 | 2020-04-21 | Fmr Llc | Generating and deploying customized software containers |
| US11539526B2 (en) * | 2018-03-15 | 2022-12-27 | Samsung Electronics Co., Ltd | Method and apparatus for managing user authentication in a blockchain network |
| KR101897032B1 (ko) | 2018-04-26 | 2018-09-10 | 이준엽 | 블록체인을 이용한 저작권 보호 장치 및 저작권 보호 방법 |
| US10917234B2 (en) * | 2018-05-03 | 2021-02-09 | International Business Machines Corporation | Blockchain for on-chain management of off-chain storage |
| CN108632284B (zh) | 2018-05-10 | 2021-02-23 | 网易(杭州)网络有限公司 | 基于区块链的用户数据授权方法、介质、装置和计算设备 |
| JP7102918B2 (ja) * | 2018-05-10 | 2022-07-20 | ブラザー工業株式会社 | サーバとサーバシステムとサーバのためのコンピュータプログラム |
| US11049148B2 (en) * | 2018-06-01 | 2021-06-29 | Concord Technologies Inc. | User control of anonymized profiling data using public and private blockchains in an electronic ad marketplace |
| US11145391B1 (en) * | 2018-07-30 | 2021-10-12 | Health Vector LLC | Longitudinal condition tracking system and method |
| AU2019236667B2 (en) * | 2018-09-28 | 2023-10-05 | Infosys Limited | System and method for decentralized identity management, authentication and authorization of applications |
| US11729175B2 (en) * | 2019-04-25 | 2023-08-15 | Comcast Cable Communications, Llc | Blockchain folding |
| US11251963B2 (en) * | 2019-07-31 | 2022-02-15 | Advanced New Technologies Co., Ltd. | Blockchain-based data authorization method and apparatus |
| US20210135857A1 (en) * | 2019-11-05 | 2021-05-06 | Verizon Patent And Licensing Inc. | System and methods for distributed runtime logging and transaction control for multi-access edge computing services |
| US20220337423A1 (en) * | 2021-04-14 | 2022-10-20 | Murray Distributed Technologies, Inc. | Blockchain ledger-based authentication techniques for reviews |
-
2019
- 2019-11-12 WO PCT/US2019/061008 patent/WO2020102246A1/en not_active Ceased
- 2019-11-12 CN CN201980088790.4A patent/CN113287141B/zh active Active
- 2019-11-12 EP EP19883824.5A patent/EP3881270A4/en active Pending
- 2019-11-12 CN CN201980088759.0A patent/CN113302645B/zh active Active
- 2019-11-12 US US17/293,396 patent/US12113781B2/en active Active
- 2019-11-12 BR BR112021008817-2A patent/BR112021008817A2/pt unknown
- 2019-11-12 MX MX2021005658A patent/MX2021005658A/es unknown
- 2019-11-12 WO PCT/US2019/061002 patent/WO2020102242A1/en not_active Ceased
- 2019-11-12 MX MX2021005659A patent/MX2021005659A/es unknown
- 2019-11-12 BR BR112021008819-9A patent/BR112021008819A2/pt unknown
- 2019-11-12 EP EP19885504.1A patent/EP3881271A4/en active Pending
-
2021
- 2021-05-11 PH PH12021551089A patent/PH12021551089A1/en unknown
- 2021-05-11 PH PH12021551090A patent/PH12021551090A1/en unknown
- 2021-05-11 ZA ZA2021/03185A patent/ZA202103185B/en unknown
- 2021-05-11 ZA ZA2021/03186A patent/ZA202103186B/en unknown
- 2021-06-11 CO CONC2021/0007712A patent/CO2021007712A2/es unknown
- 2021-06-11 CO CONC2021/0007714A patent/CO2021007714A2/es unknown
-
2024
- 2024-08-09 US US18/799,880 patent/US20240406156A1/en active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| CN113287141A (zh) | 2021-08-20 |
| ZA202103185B (en) | 2022-10-26 |
| US12113781B2 (en) | 2024-10-08 |
| CO2021007714A2 (es) | 2021-07-19 |
| EP3881271A1 (en) | 2021-09-22 |
| ZA202103186B (en) | 2022-10-26 |
| EP3881270A1 (en) | 2021-09-22 |
| PH12021551090A1 (en) | 2022-01-03 |
| CO2021007712A2 (es) | 2021-06-21 |
| CN113287141B (zh) | 2025-03-11 |
| WO2020102246A1 (en) | 2020-05-22 |
| WO2020102242A1 (en) | 2020-05-22 |
| EP3881270A4 (en) | 2022-08-17 |
| BR112021008817A2 (pt) | 2021-08-10 |
| PH12021551089A1 (en) | 2021-12-13 |
| CN113302645B (zh) | 2024-11-01 |
| US20220052988A1 (en) | 2022-02-17 |
| US20240406156A1 (en) | 2024-12-05 |
| BR112021008819A2 (pt) | 2021-08-17 |
| US20220060330A1 (en) | 2022-02-24 |
| EP3881271A4 (en) | 2022-08-17 |
| CN113302645A (zh) | 2021-08-24 |
| MX2021005658A (es) | 2021-09-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| MX2021005659A (es) | Gestión de permisos para acceder a datos de usuario en una red de confianza de registro distribuido. | |
| Hsu et al. | Paired t test | |
| EP3706022A3 (en) | Permissions policy manager to configure permissions on computing devices | |
| WO2019157333A8 (en) | Peeirs:passive evaluation of endpoint identity and risk as a surrogate authentication factor | |
| SA520420264B1 (ar) | إدارة مُعرِّف اشتراك موحد في أنظمة الاتصال | |
| Casini | Glass ceiling and glass elevator | |
| BR112015025282A2 (pt) | sistema para controlar o acesso de indivíduos a uma área | |
| NZ763096A (en) | A device management system | |
| GB2523038A (en) | Policy enforcement in computing environment | |
| GB2611674A8 (en) | Federated security for multi-enterprise communications | |
| AU2017296139A8 (en) | Managing permissions | |
| SG11201805866UA (en) | Permission management and resource control method and apparatus | |
| EP4290400A3 (en) | Controlling access to computer resources | |
| SE1751187A1 (en) | Method and subscriber identity component for providing network access | |
| Go | Colonialism and neocolonialism | |
| Schmid | Social identity theory | |
| Rehg | Polyspecific associations | |
| Jelinek | Management, classical theory | |
| Anderson | Pastor–Parishioner Communication | |
| Mot et al. | Customary Law | |
| Chen | Construct equivalence | |
| Crosswell | Grant, General Ulysses S.(1822–1885) | |
| Albro | M ovement T oward S ocialism (MAS–IPSP)(B olivia) | |
| Fenton‐O'Creevy | Employee involvement | |
| BR112019002220A2 (pt) | sistema para controlar os dados pessoais de um usuário de redes de telecomunicações, e método para controlar dados pessoais de um usuário de redes de telecomunicações |