Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020222927 - LOCALIZATION OF DID-RELATED CLAIMS AND DATA

Publication Number WO/2020/222927
Publication Date 05.11.2020
International Application No. PCT/US2020/023225
International Filing Date 17.03.2020
IPC
H04L 9/32 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system
CPC
G06F 21/6245
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
6218to a system of files or objects, e.g. local or distributed file system or database
6245Protecting personal data, e.g. for financial or medical purposes
H04L 2209/38
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
38Chaining, e.g. hash chain or certificate chain
H04L 63/00
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
H04L 9/3239
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system ; or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
3236using cryptographic hash functions
3239involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
H04L 9/3297
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system ; or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
3297involving time stamps, e.g. generation of time stamps
Applicants
  • MICROSOFT TECHNOLOGY LICENSING, LLC [US]/[US]
Inventors
  • MURDOCH, Brandon
  • BUCHNER, Daniel James
  • PATEL, Ankur
Agents
  • SWAIN, Cassandra T.
  • ADJEMIAN, Monica
  • BARKER, Doug
  • CHATTERJEE, Aaron C.
  • CHEN, Wei-Chen Nicholas
  • CHOI, Daniel
  • CHURNA, Timothy
  • DINH, Phong
  • EVANS, Patrick
  • GABRYJELSKI, Henry
  • GUPTA, Anand
  • HINOJOSA-SMITH, Brianna L.
  • HWANG, William C.
  • JARDINE, John S.
  • LEE, Sunah
  • LEMMON, Marcus
  • MARQUIS, Thomas
  • MEYERS, Jessica
  • ROPER, Brandon
  • SPELLMAN, Steven
  • SULLIVAN, Kevin
  • WALKER, Matt
  • WIGHT, Stephen A.
  • WISDOM, Gregg
  • WONG, Ellen
  • WONG, Thomas S.
  • ZHANG, Hannah
  • TRAN, Kimberly
Priority Data
16/397,74629.04.2019US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) LOCALIZATION OF DID-RELATED CLAIMS AND DATA
(FR) LOCALISATION DE DONNÉES ET DE REVENDICATIONS ASSOCIÉES AUX DID
Abstract
(EN)
Embodiments disclosed herein are related to computing systems and methods for localizing how a user will receive and view received DID-related data. The computing system and methods are implemented in the decentralized network that implements a distributed ledger that backs one or more decentralized identities (DID) for one or more users of the computing system. Various sets of rule are accessed. The sets of rules specify how a DID owner will receive and view DID-related data received from a third party entity. The sets of rules are applied to the DID-related data received from the third party entity. The received DID-related data is modified such that the received DID-related data conforms to the one or more sets of rules. The modified DID-related data is provided to the DID owner so that the DID owner is able to view the modified DID-related data according to the applied sets of rules.
(FR)
Les modes de réalisation de la présente invention concernent des systèmes informatiques et des procédés destinés à localiser la manière dont un utilisateur va recevoir et visualiser des données associées à des DID reçues. Le système informatique et des procédés sont mis en œuvre dans le réseau décentralisé qui met en œuvre un registre distribué soutenant au moins une identité décentralisée (DID) pour au moins un utilisateur du système informatique. Divers ensembles de règles sont accédés. Les ensembles de règles spécifient la manière dont un propriétaire de DID va recevoir et visualiser des données associées aux DID reçues en provenance d'une entité tierce. Les ensembles de règles sont appliquées aux données associées aux DID reçues de l'entité tierce. Les données associées aux DID reçues sont modifiées de telle sorte que les données associées aux DID reçues sont conformes audit ensemble de règles. Les données associées aux DID modifiées sont fournies au propriétaire de DID de telle sorte que le propriétaire de DID est susceptible de visualiser les données associées à la DID modifiée conformément aux ensembles de règles appliquées.
Latest bibliographic data on file with the International Bureau