[go: up one dir, main page]

MX2021005659A - Gestión de permisos para acceder a datos de usuario en una red de confianza de registro distribuido. - Google Patents

Gestión de permisos para acceder a datos de usuario en una red de confianza de registro distribuido.

Info

Publication number
MX2021005659A
MX2021005659A MX2021005659A MX2021005659A MX2021005659A MX 2021005659 A MX2021005659 A MX 2021005659A MX 2021005659 A MX2021005659 A MX 2021005659A MX 2021005659 A MX2021005659 A MX 2021005659A MX 2021005659 A MX2021005659 A MX 2021005659A
Authority
MX
Mexico
Prior art keywords
user data
access
user
distributed ledger
users
Prior art date
Application number
MX2021005659A
Other languages
English (en)
Inventor
Ashish Gadnis
Jeffrey A Keiser
Stanislav S Natalenko
Original Assignee
Banqu Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Banqu Inc filed Critical Banqu Inc
Publication of MX2021005659A publication Critical patent/MX2021005659A/es

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1076Resource dissemination mechanisms or network resource keeping policies for optimal resource availability in the overlay network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

Se describen mecanismos para gestionar permisos para acceder a datos de usuario en una red de confianza de registro distribuido ("DLTN"). Un usuario dado puede compartir acceso a datos de usuario de una manera detallada. El acceso a los datos de usuario puede depender de la categoría de datos de usuario y/o el papel de otro usuario (por ejemplo, si el otro usuario se reconoce como una conexión). El acceso a los datos de usuario puede tener una duración limitada. Los permisos para acceder a datos de usuario se pueden establecer de forma proactiva o reactiva. Un protocolo permite que un revisor potencial solicite acceso a los datos de usuario de un usuario dado, con el usuario dado aprobando o rechazando selectivamente el acceso por parte del revisor. De esta manera, un usuario dado puede controlar el acceso a los datos de usuario en la DLTN, otorgando selectivamente (o revocando) acceso a algunos de los datos de usuario o todos los datos de usuario, por parte de otros usuarios seleccionados o por todos los demás usuarios.
MX2021005659A 2018-11-13 2019-11-12 Gestión de permisos para acceder a datos de usuario en una red de confianza de registro distribuido. MX2021005659A (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862760789P 2018-11-13 2018-11-13
PCT/US2019/061008 WO2020102246A1 (en) 2018-11-13 2019-11-12 Managing permissions to access user data in a distributed ledger trust network

Publications (1)

Publication Number Publication Date
MX2021005659A true MX2021005659A (es) 2021-09-10

Family

ID=70730834

Family Applications (2)

Application Number Title Priority Date Filing Date
MX2021005658A MX2021005658A (es) 2018-11-13 2019-11-12 Definición y gestión de formularios en una red de confianza de libro mayor distribuido.
MX2021005659A MX2021005659A (es) 2018-11-13 2019-11-12 Gestión de permisos para acceder a datos de usuario en una red de confianza de registro distribuido.

Family Applications Before (1)

Application Number Title Priority Date Filing Date
MX2021005658A MX2021005658A (es) 2018-11-13 2019-11-12 Definición y gestión de formularios en una red de confianza de libro mayor distribuido.

Country Status (9)

Country Link
US (2) US12113781B2 (es)
EP (2) EP3881270A4 (es)
CN (2) CN113287141B (es)
BR (2) BR112021008817A2 (es)
CO (2) CO2021007712A2 (es)
MX (2) MX2021005658A (es)
PH (2) PH12021551089A1 (es)
WO (2) WO2020102246A1 (es)
ZA (2) ZA202103185B (es)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12184781B2 (en) 2017-07-10 2024-12-31 Burstiq, Inc. Systems and methods for accessing digital assets in a blockchain using owner consent contracts
US11729175B2 (en) * 2019-04-25 2023-08-15 Comcast Cable Communications, Llc Blockchain folding
GB201913144D0 (en) * 2019-09-12 2019-10-30 Nchain Holdings Ltd Sharing data via transactions of a blockchain
US12143520B2 (en) * 2019-11-19 2024-11-12 Consensys Software Inc. Network multi-tenant architecture for distributed ledger systems
US11769577B1 (en) 2020-01-15 2023-09-26 Ledgerdomain Inc. Decentralized identity authentication framework for distributed data
US12105842B1 (en) 2020-01-15 2024-10-01 Ledgerdomain Inc. Verifiable credentialling and message content provenance authentication
US11081219B1 (en) 2020-01-15 2021-08-03 Ledgerdomain Inc. Secure messaging in a machine learning blockchain network
FR3107417A1 (fr) * 2020-02-19 2021-08-20 Orange Procédé et dispositif de contrôle d’accès à une fonction d’une application inscrite dans une chaîne de blocs.
WO2021211027A1 (en) * 2020-04-17 2021-10-21 Telefonaktiebolaget Lm Ericsson (Publ) Resource sharing for cooperative communications
US12105833B2 (en) * 2020-04-22 2024-10-01 T-Mobile Usa, Inc. Blockchain-based subscriber data protection and access
US11539787B2 (en) 2020-04-30 2022-12-27 T-Mobile Usa, Inc. 5G enabled massively distributed on-demand personal cloud system and method
US11418587B2 (en) * 2020-04-30 2022-08-16 T-Mobile Usa, Inc. 5G on-demand dynamically instantiated blockchain for highly distributed peer-to-peer consumer cloud
US12143395B2 (en) * 2020-05-05 2024-11-12 International Business Machines Corporation Low trust privileged access management
GB2595216A (en) * 2020-05-15 2021-11-24 Nchain Holdings Ltd Multi-layer communication network
WO2022046524A1 (en) * 2020-08-24 2022-03-03 Burstiq, Inc. Systems and methods for accessing digital assets in a blockchain using owner consent contracts
US11651096B2 (en) * 2020-08-24 2023-05-16 Burstiq, Inc. Systems and methods for accessing digital assets in a blockchain using global consent contracts
US11748303B2 (en) * 2020-11-23 2023-09-05 Ford Global Technologies, Llc Systems and methods for remote storage of information associated with a distributed ledger network
US12236222B2 (en) * 2020-12-30 2025-02-25 Accenture Global Solutions Limited Scalable, robust, and secure multi-tenant edge architecture for mission-critical applications
CN114492351B (zh) * 2021-09-23 2024-10-22 中国电力科学研究院有限公司 一种用于业务流程处理的智能加密表单构造方法及系统
US12067132B2 (en) * 2021-12-23 2024-08-20 Oracle International Corporation Just-in-time data object permission restriction
US12189796B2 (en) 2021-12-23 2025-01-07 Oracle International Corporation Just-in-time data object permission restriction and action implementation
US12526127B2 (en) * 2022-08-31 2026-01-13 Beijing Boe Technology Development Co., Ltd. Resource distribution method and apparatus
US12401510B2 (en) * 2022-09-12 2025-08-26 Capital One Services, Llc Systems and methods for user control and exclusion of cryptographic tokenized data
US11736290B1 (en) 2022-11-07 2023-08-22 Ledgerdomain Inc. Management of recipient credentials leveraging private keys on keystores read by provisioned devices
US11741215B1 (en) 2022-11-07 2023-08-29 Ledgerdomain Inc. Recipient credentialing leveraging private keys on keystores read by provisioned devices
US11741216B1 (en) 2022-11-07 2023-08-29 Ledgerdomain Inc. Credential revocation leveraging private keys on keystores read by provisioned devices
US11848754B1 (en) 2022-11-07 2023-12-19 Ledgerdomain Inc. Access delegation leveraging private keys on keystores read by provisioned devices
EP4690681A1 (en) * 2023-04-03 2026-02-11 Verai Systems, LLC Multiple encryption data storage and retrieval system

Family Cites Families (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7181017B1 (en) * 2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications
US20030191703A1 (en) 2002-02-01 2003-10-09 Ubs Painewebber Inc. Method and system for providing interested party access to aggregated accounts information
US8752197B2 (en) * 2002-06-18 2014-06-10 International Business Machines Corporation Application independent system, method, and architecture for privacy protection, enhancement, control, and accountability in imaging service systems
JP4434969B2 (ja) * 2004-01-21 2010-03-17 株式会社東芝 コンテンツ提供側システム、ユーザ側システム、追跡システム、装置、方法及びプログラム
CA2623137C (en) 2005-05-13 2014-10-21 Cryptomill Technologies Ltd. Cryptographic control for mobile storage means
US8538980B1 (en) * 2005-06-15 2013-09-17 Adobe Systems Incorporated Accessing forms using a metadata registry
US7711700B2 (en) * 2005-11-28 2010-05-04 Commvault Systems, Inc. Systems and methods for classifying and transferring information in a storage network
US8583915B1 (en) 2007-05-31 2013-11-12 Bby Solutions, Inc. Security and authentication systems and methods for personalized portable devices and associated systems
US7984512B2 (en) * 2007-06-14 2011-07-19 Microsoft Corporation Integrating security by obscurity with access control lists
US20090002333A1 (en) 2007-06-22 2009-01-01 Chumby Industries, Inc. Systems and methods for device registration
TW200913710A (en) 2007-07-13 2009-03-16 Chumby Ind Inc Systems and methods for alarm tone selection, distribution, and playback in a networked audiovisual device
KR101226925B1 (ko) * 2008-07-21 2013-01-28 최상혁 상품권 결제 방법
CN102291373B (zh) * 2010-06-15 2016-08-31 华为技术有限公司 元数据文件的更新方法、装置和系统
US8914635B2 (en) * 2011-07-25 2014-12-16 Grey Heron Technologies, Llc Method and system for establishing secure communications using composite key cryptography
US9336500B2 (en) * 2011-09-21 2016-05-10 Twilio, Inc. System and method for authorizing and connecting application developers and users
CN102360290A (zh) * 2011-09-29 2012-02-22 用友软件股份有限公司 表单生成装置和表单生成方法
US9105043B2 (en) 2012-03-06 2015-08-11 Postrel Richard Method and system for providing incentives to members of a social network
FR2988192B1 (fr) * 2012-03-19 2016-01-01 Syneria Procede et systeme de developpement d'applications de consultation de contenus et services sur un reseau de telecommunication, de distribution et d'execution de telles applications sur de multiples appareils.
US20140075280A1 (en) * 2012-09-13 2014-03-13 Sw Development, Llc Systems and Methods for Transferring Data from an Accessible Database into Forms that Manipulate Databases
US20160005032A1 (en) 2012-11-28 2016-01-07 Hoverkey Ltd. Method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
US10102510B2 (en) 2012-11-28 2018-10-16 Hoverkey Ltd. Method and system of conducting a cryptocurrency payment via a mobile device using a contactless token to store and protect a user's secret key
KR101751534B1 (ko) * 2013-07-05 2017-06-28 농협은행(주) 불법적 금융 거래 방지 장치
US20170140375A1 (en) * 2015-11-15 2017-05-18 Michael Kunstel System and Method for Permissioned Distributed Block Chain
GEP20207163B (en) 2016-02-08 2020-10-12 Guy Scott A system and method for document information authenticity verification
US20170228252A1 (en) * 2016-02-10 2017-08-10 Qualcomm Incorporated System and method for multi-tile data transactions in a system on a chip
CA3031133C (en) 2016-07-18 2024-01-16 Royal Bank Of Canada Distributed ledger platform for vehicle records
US10250694B2 (en) * 2016-08-19 2019-04-02 Ca, Inc. Maintaining distributed state among stateless service clients
US11657176B2 (en) * 2016-08-23 2023-05-23 Health Blockchain Convergence, Inc. Blockchain-based mechanisms for secure health information resource exchange
AU2017315345B2 (en) * 2016-08-23 2022-01-06 BBM Health LLC Blockchain-based mechanisms for secure health information resource exchange
US10402796B2 (en) * 2016-08-29 2019-09-03 Bank Of America Corporation Application life-cycle transition record recreation system
US20180075677A1 (en) 2016-09-09 2018-03-15 Tyco Integrated Security, LLC Architecture for Access Management
WO2018057520A1 (en) * 2016-09-20 2018-03-29 Nant Holdings Ip, Llc Sample tracking via sample tracking chains, systems and methods
US9961155B1 (en) 2016-12-01 2018-05-01 Dropbox, Inc. Sharing content via virtual spaces
JP7308756B2 (ja) 2016-12-30 2023-07-14 ビーシー ディベロップメント ラボズ ゲーエムベーハー ブロックチェーン対応サービスプロバイダシステム
US10713368B2 (en) * 2017-02-02 2020-07-14 Alfresco Software, Inc. Application of security parameters for content
US9992022B1 (en) * 2017-02-06 2018-06-05 Northern Trust Corporation Systems and methods for digital identity management and permission controls within distributed network nodes
US11321681B2 (en) 2017-02-06 2022-05-03 Northern Trust Corporation Systems and methods for issuing and tracking digital tokens within distributed network nodes
US10691793B2 (en) * 2017-02-20 2020-06-23 AlphaPoint Performance of distributed system functions using a trusted execution environment
US11182497B2 (en) 2017-03-28 2021-11-23 Uniscen Architectures and systems for managing personal data to be utilized by dynamic sets of external parties
US10956582B1 (en) * 2017-06-13 2021-03-23 Alchemy Limited, LLC Systems and methods for secure storage of encrypted data on a distributed computing platform, the distributed computing platform being based on a distributed ledger
CN107608747B (zh) * 2017-09-22 2021-03-05 携程旅游信息技术(上海)有限公司 表单系统的构建方法、装置、电子设备、存储介质
US11979490B2 (en) * 2017-10-24 2024-05-07 0Chain Corp. Non-fungible token blockchain processing
US11170092B1 (en) * 2017-12-14 2021-11-09 United Services Automobile Association (Usaa) Document authentication certification with blockchain and distributed ledger techniques
US10701054B2 (en) * 2018-01-31 2020-06-30 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing super community and community sidechains with consent management for distributed ledger technologies in a cloud based computing environment
US10628599B2 (en) * 2018-02-14 2020-04-21 Fmr Llc Generating and deploying customized software containers
US11539526B2 (en) * 2018-03-15 2022-12-27 Samsung Electronics Co., Ltd Method and apparatus for managing user authentication in a blockchain network
KR101897032B1 (ko) 2018-04-26 2018-09-10 이준엽 블록체인을 이용한 저작권 보호 장치 및 저작권 보호 방법
US10917234B2 (en) * 2018-05-03 2021-02-09 International Business Machines Corporation Blockchain for on-chain management of off-chain storage
CN108632284B (zh) 2018-05-10 2021-02-23 网易(杭州)网络有限公司 基于区块链的用户数据授权方法、介质、装置和计算设备
JP7102918B2 (ja) * 2018-05-10 2022-07-20 ブラザー工業株式会社 サーバとサーバシステムとサーバのためのコンピュータプログラム
US11049148B2 (en) * 2018-06-01 2021-06-29 Concord Technologies Inc. User control of anonymized profiling data using public and private blockchains in an electronic ad marketplace
US11145391B1 (en) * 2018-07-30 2021-10-12 Health Vector LLC Longitudinal condition tracking system and method
AU2019236667B2 (en) * 2018-09-28 2023-10-05 Infosys Limited System and method for decentralized identity management, authentication and authorization of applications
US11729175B2 (en) * 2019-04-25 2023-08-15 Comcast Cable Communications, Llc Blockchain folding
US11251963B2 (en) * 2019-07-31 2022-02-15 Advanced New Technologies Co., Ltd. Blockchain-based data authorization method and apparatus
US20210135857A1 (en) * 2019-11-05 2021-05-06 Verizon Patent And Licensing Inc. System and methods for distributed runtime logging and transaction control for multi-access edge computing services
US20220337423A1 (en) * 2021-04-14 2022-10-20 Murray Distributed Technologies, Inc. Blockchain ledger-based authentication techniques for reviews

Also Published As

Publication number Publication date
CN113287141A (zh) 2021-08-20
ZA202103185B (en) 2022-10-26
US12113781B2 (en) 2024-10-08
CO2021007714A2 (es) 2021-07-19
EP3881271A1 (en) 2021-09-22
ZA202103186B (en) 2022-10-26
EP3881270A1 (en) 2021-09-22
PH12021551090A1 (en) 2022-01-03
CO2021007712A2 (es) 2021-06-21
CN113287141B (zh) 2025-03-11
WO2020102246A1 (en) 2020-05-22
WO2020102242A1 (en) 2020-05-22
EP3881270A4 (en) 2022-08-17
BR112021008817A2 (pt) 2021-08-10
PH12021551089A1 (en) 2021-12-13
CN113302645B (zh) 2024-11-01
US20220052988A1 (en) 2022-02-17
US20240406156A1 (en) 2024-12-05
BR112021008819A2 (pt) 2021-08-17
US20220060330A1 (en) 2022-02-24
EP3881271A4 (en) 2022-08-17
CN113302645A (zh) 2021-08-24
MX2021005658A (es) 2021-09-10

Similar Documents

Publication Publication Date Title
MX2021005659A (es) Gestión de permisos para acceder a datos de usuario en una red de confianza de registro distribuido.
Hsu et al. Paired t test
EP3706022A3 (en) Permissions policy manager to configure permissions on computing devices
WO2019157333A8 (en) Peeirs:passive evaluation of endpoint identity and risk as a surrogate authentication factor
SA520420264B1 (ar) إدارة مُعرِّف اشتراك موحد في أنظمة الاتصال
Casini Glass ceiling and glass elevator
BR112015025282A2 (pt) sistema para controlar o acesso de indivíduos a uma área
NZ763096A (en) A device management system
GB2523038A (en) Policy enforcement in computing environment
GB2611674A8 (en) Federated security for multi-enterprise communications
AU2017296139A8 (en) Managing permissions
SG11201805866UA (en) Permission management and resource control method and apparatus
EP4290400A3 (en) Controlling access to computer resources
SE1751187A1 (en) Method and subscriber identity component for providing network access
Go Colonialism and neocolonialism
Schmid Social identity theory
Rehg Polyspecific associations
Jelinek Management, classical theory
Anderson Pastor–Parishioner Communication
Mot et al. Customary Law
Chen Construct equivalence
Crosswell Grant, General Ulysses S.(1822–1885)
Albro M ovement T oward S ocialism (MAS–IPSP)(B olivia)
Fenton‐O'Creevy Employee involvement
BR112019002220A2 (pt) sistema para controlar os dados pessoais de um usuário de redes de telecomunicações, e método para controlar dados pessoais de um usuário de redes de telecomunicações