Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020222923 - EXECUTION OF AN APPLICATION WITHIN A SCOPE OF USER-GRANTED PERMISSION

Note: Text based on automatic Optical Character Recognition processes. Please use the PDF version for legal matters

[ EN ]

CLAIMS

1. A computing system comprising:

one or more processors; and

one or more computer-readable media having thereon computer-executable instructions that are structured such that, when executed by the one or more processors, cause the computing system to:

receive a request from an entity for using data stored in a data storage that is associated with an owner of a first decentralized identifier (DID) as one or more input(s) of an application associated with the entity to generate one or more result(s);

identify one or more characteristics of the application associated with the entity; based on the identified one or more characteristics, determine a scope of permission to access the requested data that is to be granted to the entity;

grant the scope of permission to the entity to use the data stored in the storage as the one or more input(s) of the application associated with the entity; and

receive the one or more result(s) from the application.

2. The computing system of claim 1, wherein the entity is associated with a second DID that is different than the first DID, and

wherein the identifying one or more characteristics of the application includes identifying the second DID of the entity.

3. The computing system of claim 1, wherein the application associated with the entity is associated with a third DID, and

wherein the identifying characteristics of the application includes identifying the third DID of the application.

4. The computing system of claim 1, wherein the scope of permission includes at least one of the following:

an amount of data permitted to be accessed by the entity;

allowing the entity only to read the data requested;

allowing the entity only to access the requested data within a predetermined time frame;

allowing the entity only to access the requested data a predetermined number of times; and

allowing the entity only to use the requested data as the one or more input(s) of the application to generate the one or more output(s).

5. The computing system of claim 1, wherein the computing system is further

caused to:

in response to the request from the application, generate a notification to the owner of the first DID that the request has been received.

6. The computing system of claim 1, wherein the computing system is further caused to:

receive an indication from the owner of the first DID indicating a desired scope of permission.

7. The computing system of claim 1, wherein the computing system is further caused to:

generate a notification after the receiving the one or more result(s) from the application.

8. The computing system of claim 1, wherein the computing system is further caused to:

in response to granting the permission to the entity, accessing the requested data from the data storage; and

providing the requested data to the entity.

9. In a computing system that is implemented in a decentralized network that implements a distributed ledger, the distributed ledger being configured to back one or more decentralized identities (DID) for one or more users of the computing system, a method for executing an application within a scope of user-granted permission, the method comprising: receiving a request from an entity for using data stored in a data storage that is associated with an owner of a first decentralized identifier (DID) as one or more input(s) of an application associated with the entity to generate one or more result(s);

identifying one or more characteristics of the application associated with the entity; based on the identified one or more characteristics, determining a scope of permission to access the requested data that is to be granted to the entity;

granting the scope of permission to the entity to use the data stored in the storage as the one or more input(s) of the application associated with the entity; and

receiving the one or more result(s) from the application.

10. The method of claim 9, wherein the entity is associated with a second DID that is different than the first DID, and

wherein the identifying one or more characteristics of the application includes identifying the second DID of the entity.