Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020222923 - EXECUTION OF AN APPLICATION WITHIN A SCOPE OF USER-GRANTED PERMISSION

Publication Number WO/2020/222923
Publication Date 05.11.2020
International Application No. PCT/US2020/023051
International Filing Date 17.03.2020
IPC
H04L 9/32 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
CPC
G06F 21/62
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/6254
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
6218to a system of files or objects, e.g. local or distributed file system or database
6245Protecting personal data, e.g. for financial or medical purposes
6254by anonymising data, e.g. decorrelating personal data from the owner's identification
H04L 2209/38
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
38Chaining, e.g. hash chain or certificate chain
H04L 63/101
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
10for controlling access to network resources
101Access control lists [ACL]
H04L 63/102
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
10for controlling access to network resources
102Entity profiles
H04L 63/105
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
10for controlling access to network resources
105Multiple levels of security
Applicants
  • MICROSOFT TECHNOLOGY LICENSING, LLC [US]/[US]
Inventors
  • MURDOCH, Brandon
  • BUCHNER, Daniel, James
  • PATEL, Ankur
Agents
  • SWAIN, Cassandra, T.
  • ADJEMIAN, Monica
  • BARKER, Doug
  • CHATTERJEE, Aaron, C.
  • CHEN, Wei-Chen, Nicholas
  • CHOI, Daniel
  • CHURNA, Timothy
  • DINH, Phong
  • EVANS, Patrick
  • GABRYJELSKI, Henry
  • GUPTA, Anand
  • HINOJOSA-SMITH, Brianna, L.
  • HWANG, William, C.
  • JARDINE, John, S.
  • LEE, Sunah
  • LEMMON, Marcus
  • MARQUIS, Thomas
  • MEYERS, Jessica
  • ROPER, Brandon
  • SPELLMAN, Steven
  • SULLIVAN, Kevin
  • WALKER, Matt
  • WIGHT, Stephen, A.
  • WISDOM, Gregg
  • WONG, Ellen
  • WONG, Thomas, S.
  • ZHANG, Hannah
  • TRAN, Kimberly
Priority Data
16/397,76529.04.2019US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) EXECUTION OF AN APPLICATION WITHIN A SCOPE OF USER-GRANTED PERMISSION
(FR) EXÉCUTION D'UNE APPLICATION DANS UNE PORTÉE D'AUTORISATION ACCORDÉE PAR L'UTILISATEUR
Abstract
(EN)
Executing an application within a scope of user-granted permission in a decentralized network that implements a distributed edger. First, receiving a request from an entity for using data stored in a data storage that is associated with a DID owner as one or more inputs of an application associated with the entity to generate one or more results. Next, one or more characteristics of the application associated with the entity is identified. Based on identified one or more characteristics, a scope of permission to access the requested data that is to be granted to the entity is determined. Then, the scope of permission is granted to the entity to use the data as the one or more inputs of the application associated with the entity. Finally, the one or more results from the application is received.
(FR)
L'invention concerne l'exécution d'une application dans une portée d'autorisation accordée par l'utilisateur dans un réseau décentralisé qui met en oeuvre un registre distribué. En premier lieu, la réception d'une demande en provenance d'une entité pour utiliser des données stockées dans une mémoire de données qui est associée à un propriétaire DID en tant qu'une ou plusieurs entrées d'une application associée à l'entité afin de générer un ou plusieurs résultats. Ensuite, une ou plusieurs caractéristiques de l'application associée à l'entité sont identifiées. Sur la base d'une ou plusieurs caractéristiques identifiées, une portée d'autorisation d'accès aux données demandées qui doivent être accordées à l'entité est déterminée. Puis, la portée d'autorisation est accordée à l'entité afin d'utiliser les données en tant qu'une ou plusieurs entrées de l'application associée à l'entité. Enfin, un ou plusieurs résultats de l'application sont reçus.
Latest bibliographic data on file with the International Bureau