GB2610072A - Data sharing via distributed ledgers - Google Patents

Data sharing via distributed ledgers Download PDF

Info

Publication number
GB2610072A
GB2610072A GB2213494.4A GB202213494A GB2610072A GB 2610072 A GB2610072 A GB 2610072A GB 202213494 A GB202213494 A GB 202213494A GB 2610072 A GB2610072 A GB 2610072A
Authority
GB
United Kingdom
Prior art keywords
data
smart contract
server system
account
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB2213494.4A
Other versions
GB2610072B (en
GB202213494D0 (en
Inventor
Kuzin Taras
Tang Qiaochu
Frensch Steve
M Santoro John
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Capital One Services LLC
Original Assignee
Capital One Services LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US16/431,299 external-priority patent/US10474834B1/en
Priority claimed from US16/431,409 external-priority patent/US10554406B1/en
Application filed by Capital One Services LLC filed Critical Capital One Services LLC
Publication of GB202213494D0 publication Critical patent/GB202213494D0/en
Publication of GB2610072A publication Critical patent/GB2610072A/en
Application granted granted Critical
Publication of GB2610072B publication Critical patent/GB2610072B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

For authorizing the sharing of data between a variety of systems, request data is obtained by a server system, the request data including a user account identifier, a smart contract address and an indication of desired data. An alias token is determined that is associated with the user account identifier. A smart contract is determined based on the address and associated with the alias token. The smart contract is maintained using a distributed ledger stored using a distributed network system. A request is transmitted by the server system to the distributed network system to execute the smart contract. A message based on the smart contract is transmitted and includes the identified alias token and the indication of desired data. A response component is obtained from each related server system and includes data that corresponds to the indication of desired data and associated with the alias token. Account data is then generated based on the indication of desired data and a response is generated that includes a response component and the account data.

Description

DATA SHARING VIA DISTRIBUTED LEDGERS
[0001] A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
FIELD OF USE
[0002] Aspects of the disclosure relate generally to sharing data and more specifically to the authorization of data sharing between multiple systems
BACKGROUND
[0003] A variety of systems may store data regarding a user in a secure fashion. This data is generally proprietary to the system storing the data and not accessible by external systems. Authorization of the sharing of data between systems is typically implemented by sharing account information, such as usernames and passwords, or using an access delegation framework, such as 0Auth. Sharing account information is generally insecure as any malicious party acquiring the account information may masquerade as the user without detection. Access delegation frameworks typically do not facilitate sharing between more than two systems and fail to provide a standardized interface for sharing between systems, thereby limiting interoperability between systems.
[0004] Aspects described herein may address these and other problems, and generally improve the quality, efficiency, and speed of sharing data between systems by providing tokens using a distributed ledger for automatically authorizing the transfer of data between systems.
SUMMARY
[0005] The following presents a simplified summary of various aspects described herein.
This summary is not an extensive overview, and is not intended to identify key or critical elements or to delineate the scope of the claims. The following summary merely presents some concepts in a simplified form as an introductory prelude to the more detailed description provided below. Corresponding apparatus, systems, and computer-readable media are also within the scope of the disclosure.
[0006] Systems as described herein may include authorizing the sharing of data and sharing data between a variety of systems. A request to share data may be provided to a first system. The system may create sharing session data on a distributed ledger accessible by a number of systems. Sharing session data may be stored using a transaction stored on a distributed ledger. A second system may obtain the sharing session data and verify the sharing session. On verification of the sharing session, a variety of data may be shared between the systems identified in the sharing session data. The sharing session data may be established between two or more systems. The distributed ledger may be maintained by the systems themselves and/or a distributed network system. In a variety of embodiments, encrypted data may be stored and/or obtained using the distributed ledger.
[0007] These features, along with many others, are discussed in greater detail below.
BRIEF DESCRIPTION OF THE DRAWINGS
[0008] The present disclosure is described by way of example and not limited in the accompanying figures in which like reference numerals indicate similar elements and in which: [0009] FIG. 1 shows an example of a data sharing system in which one or more aspects described herein may be implemented; 100101 FIG. 2 shows an example computing device in accordance with one or more aspects described herein; [0011] FIG. 3A shows a flow chart of a process for authorizing data sharing using distributed ledgers according to one or more aspects of the disclosure; [0012] FIG. 3B shows a flow chart of a process for authorizing data sharing using smart contracts according to one or more aspects of the disclosure; [0013] FIG. 4 shows a flow chart of a process for obtaining response data according to one
or more aspects of the disclosure;
[0014] FIG. 5 shows a flow chart of a process for generating a distributed ledger according
to one or more aspects of the disclosure;
[0015] FIG. 6 shows a flow chart of a process for generating a smart contract according to
one or more aspects of the disclosure;
[0016] FIG. 7 shows a flow chart of a process for obtaining an authorization to share data according to one or more aspects of the disclosure; and [0017] FIG. 8 shows a flow chart of a process for terminating an authorization according to
one or more aspects of the disclosure.
DETAILED DESCRIPTION
[0018] In the following description of the various embodiments, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration various embodiments in which aspects of the disclosure may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made without departing from the scope of the present disclosure. Aspects of the disclosure are capable of other embodiments and of being practiced or being carried out in various ways. In addition, it is to be understood that the phraseology and terminology used herein are for the purpose of description and should not be regarded as limiting. Rather, the phrases and terms used herein are to be given their broadest interpretation and meaning.
[0019] By way of introduction, aspects discussed herein may relate to methods and techniques for authorizing and sharing data between multiple systems. Users may have account data stored across a variety of account systems. Many users wish to aggregate their data into a single interface for easy review and/or analysis. Existing aggregation systems typically use account information sharing and/or an access delegation framework to obtain access to a user's account on a particular system via a web interface. The aggregation system may then scrape the web interface to obtain the user's data. However, this approach has a number of drawbacks and limitations. Sharing account information, such as a user's usemame and password, for a particular system presents a large security risk as any malicious party which obtains the username and password gains access to the user's account. Access delegation frameworks, such as 0Auth, generally use the user's account information and do not readily allow for sharing data between more than two parties. In the event that the user wishes to change their password on one system, the user must also update the information used by the aggregation system as the aggregation system will not be able to access the system after the password has changed. Additionally, any change in the format of the web interface presented by a particular system may cause an aggregation system to be unable to parse the web interface to scrape the necessary data.
100201 Data sharing systems as described herein allow for the sharing of data between a variety of systems without the drawbacks of existing systems. A request to share data may be provided to a first system. The system may create sharing session data on a distributed ledger accessible by a number of systems. Sharing session data may be stored using a transaction stored on a distributed ledger and/or a smart contract that may be executed by a distributed network system. A second system may obtain the sharing session data and verify the sharing session. On verification of the sharing session, a variety of data may be shared between the systems identified in the sharing session data. The sharing session data may be established between two systems and/or a number of systems. The distributed ledger may be maintained by the systems themselves and/or a distributed network system. The distributed network system may provide a publicly available mechanism for executing smart contracts.
[0021] In many aspects, a data sharing device may request a sharing session between two or more account server systems. A first account server system may create sharing session data on a distributed ledger. A second account server system may obtain the sharing session data and request verification of the sharing session from the data sharing device. On verification of the sharing session, both account server systems may transmit data associated with the sharing session to each other. In several aspects, data from each account sewer system may be received by a data sharing device in a session with either account server system.
[0022] Data sharing systems improve the functioning of computer systems to securely share data across multiple systems by reducing the computational power and storage needed to authenticate and share data between devices. Access delegation frameworks typically require a number of tokens that scales exponentially with the number of systems sharing data. Sharing session data utilized in data sharing systems scales linearly with the number of systems sharing data. Additionally, sharing session data utilizes secure approval received from a data sharing device, providing a verification that data should be shared without requiring a username and password to be provided to an account sewer system. Security may be further improved by only allowing access to a distributed ledger and/or distributed network system to particular LP addresses and/or subnets.
Data Sharing Systems [0023] FIG. 1 shows a data sharing system 100. The data sharing system 100 may include at least one data sharing device 110, at least one distributed network system 120, and/or at least one account server system 130 in communication via a network 140. It will be appreciated that the network connections shown are illustrative and any means of establishing a communications link between the computers may be used. The existence of any of various network protocols such as TCP/lP, Ethernet, FTP, HTTP and the like, and of various wireless communication technologies such as GSM, CDMA, WiFi, and L EL, is presumed, and the various computing devices described herein may be configured to communicate using any of these network protocols or technologies. Any of the devices and systems described herein may be implemented, in whole or in part, using one or more computing systems described with respect to FIG. 2.
[0024] Data sharing devices 110 may request data sharing sessions, validate data sharing session requests, and/or obtain data as described herein. Distributed network systems 120 may store, modify, and/or execute distributed ledgers and/or smart contracts as described herein. A distributed network system may be publicly accessible and/or have restricted access. Access to a distributed network system may be limited to particular data sharing devices and/or account server systems. The data sharing devices and/or account server systems may be associated with a particular sharing session. Account server systems 130 may store a variety of data, maintain a distributed ledger, execute smart contracts, establish data sharing sessions, and/or request verification of a data sharing session as described herein. However, it should be noted that any device in the data sharing system 100 may perform any of the processes and/or store any data as described herein. Some or all of the data described herein may be stored using one or more databases. Databases may include, but are not limited to relational databases, hierarchical databases, distributed databases, in-memory databases, flat file databases, XML databases, NoSQL databases, graph databases, and/or a combination thereof. The network 140 may include a local area network (LAN), a wide area network (WAN), a wireless telecommunications network, and/or any other communication network or combination thereof 100251 The data transferred to and from various computing devices in data sharing system may include secure and sensitive data, such as confidential documents, customer personally identifiable information, and account data. Therefore, it may be desirable to protect transmissions of such data using secure network protocols and encryption, and/or to protect the integrity of the data when stored on the various computing devices. A file-based integration scheme or a service-based integration scheme may be utilized for transmitting data between the various computing devices. Data may be transmitted using various network communication protocols. Secure data transmission protocols and/or encryption may be used in file transfers to protect the integrity of the data such as, but not limited to, File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP), and/or Pretty Good Privacy (PGP) encryption. In many embodiments, one or more web services may be implemented within the various computing devices. Web services may be accessed by authorized external devices and users to support input, extraction, and manipulation of data between the various computing devices in the data sharing system 100. Web services built to support a personalized display system may be cross-domain and/or cross-platform, and may be built for enterprise use. Data may be transmitted using the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocol to provide secure connections between the computing devices. Web services may be implemented using the WS-Security standard, providing for secure SOAP messages using XML encryption. Specialized hardware may be used to provide secure web services. Secure network appliances may include built-in features such as hardware-accelerated SSL and HTTPS, WS-Security, and/or firewalls. Such specialized hardware may be installed and configured in the data sharing system 100 in front of one or more computing devices such that any external devices may communicate directly with the specialized hardware.
Computing Devices [0026] Turning now to FIG. 2, a computing device 200 that may be used with one or more of the computational systems is described. The computing device 200 may include a processor 203 for controlling overall operation of the computing device 200 and its associated components, including RAM 205, ROM 207, input/output device 209, communication interface 211, and/or memory 215. A data bus may interconnect processor(s) 203, RAM 205, ROM 207, memory 215, I/O device 209, and/or communication interface 211. In some embodiments, computing device 200 may represent, be incorporated in, and/or include various devices such as a desktop computer, a computer server, a mobile device, such as a laptop computer, a tablet computer, a smart phone, any other types of mobile computing devices, and the like, and/or any other type of data processing device.
100271 Input/output (1/0) device 209 may include a microphone, keypad, touch screen, and/or stylus through which a user of the computing device 200 may provide input, and may also include one or more of a speaker for providing audio output and a video display device for providing textual, audiovisual, and/or graphical output. Software may be stored within memory 215 to provide instructions to processor 203 allowing computing device 200 to perform various actions. Memory 215 may store software used by the computing device 200, such as an operating system 217, application programs 219, and/or an associated internal database 221. The various hardware memory units in memory 215 may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data. Memory 215 may include one or more physical persistent memory devices and/or one or more non-persistent memory devices. Memory 215 may include, but is not limited to, random access memory (RAM) 205, read only memory (ROM) 207, electronically erasable programmable read only memory (EEPROM), flash memory or other memory technology, optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that may be used to store the desired information and that may be accessed by processor 203.
[0028] Communication interface 211 may include one or more transceivers, digital signal processors, and/or additional circuitry and software for communicating via any network, wired or wireless, using any protocol as described herein.
[0029] Processor 203 may include a single central processing unit (CPU), which may be a single-core or multi-core processor, or may include multiple CPUs. Processor(s) 203 and associated components may allow the computing device 200 to execute a series of computer-readable instructions to perform some or all of the processes described herein. Although not shown in FIG. 2, various elements within memory 215 or other components in computing device 200, may include one or more caches including, but not limited to, CPU caches used by the processor 203, page caches used by the operating system 217, disk caches of a hard drive, and/or database caches used to cache content from database 221. For embodiments including a CPU cache, the CPU cache may be used by one or more processors 203 to reduce memory latency and access time. A processor 203 may retrieve data from or write data to the CPU cache rather than reading/writing to memory 215, which may improve the speed of these operations. In some examples, a database cache may be created in which certain data from a database 221 is cached in a separate smaller database in a memory separate from the database, such as in RAM 205 or on a separate computing device. For instance, in a multi-tiered application, a database cache on an application server may reduce data retrieval and data manipulation time by not needing to communicate over a network with a back-end database server. These types of caches and others may be included in various embodiments, and may provide potential advantages in certain implementations of devices, systems, and methods described herein, such as faster response times and less dependence on network conditions when transmitting and receiving data.
[0030] Although various components of computing device 200 are described separately, functionality of the various components may be combined and/or performed by a single component and/or multiple computing devices in communication without departing from the invention.
Authorizing Data Sharing using Distributed Ledgers [0031] Data sharing systems may utilize a distributed ledger to authorize the sharing of data between various devices. The distributed ledger may include a unique token that may be used to identify particular data accessible via the various devices. The token may be used by a variety of account server systems to identify data responsive to a request for data and provide the response data. FIG. 3A shows a flow chart of a process for authorizing data sharing using a distributed ledger according to one or more aspects of the disclosure. Some or all of the steps of process 300 may be performed using one or more computing devices as described herein.
[0032] At step 310, request data may be obtained. The request data may identify a request to obtain data stored using one or more account server systems. The request data may be generated and/or transmitted by a data sharing device. In a variety of embodiments, the request data may indicate that a data sharing device wants to obtain data from a second account server system when accessing a first account server system. The request data may indicate account information, such as a username, account number, email address, and/or the like, for an account maintained by an account server system. The request data may indicate one or more account server systems from which data sharing is desired. The indication may be via any identifying data, such as a domain name, uniform resource locator, Internet Protocol address, a common name of the account server system, and/or the like.
100331 At step 312, a distributed ledger may be determined. A distributed ledger may be determined for a pair of account server systems and/or a set of account server systems. A distributed ledger may be determined based on one or more account server systems identified in request data. The distributed ledger may be stored using one or more account server systems and/or a distributed network system. In several embodiments, a distributed network system includes a set of nodes operated by a set of account server systems. In many embodiments, a distributed network system includes a set of nodes operated by a public network. In a variety of embodiments, a distributed ledger is associated with one or more account server systems. The distributed ledger may be stored using those account server systems associated with the distributed ledger and/or may only be accessed by those account server systems associated with the distributed ledger. In this way, only those account server systems that are associated with a particular request and/or sharing session have access to the relevant sharing session data.
100341 At step 314, sharing session data may be determined. The sharing session data may be determined based on the request data. In many embodiments, the sharing session data may include an email address and the determined sharing session data may have an email address corresponding to an email address identified in the request data. A distributed ledger may store sharing session data. In a variety of embodiments, the sharing session data may be determined by querying a distributed ledger to locate one or more pieces of sharing session data based on the request data. In many embodiments, a distributed network system may execute a transaction generated based on the request data to determine the sharing session data stored using a distributed ledger maintained by the distributed networks system. The sharing session data may identify a particular alias token associated with one or more account server systems associated with the sharing session data. In several embodiments, sharing session data identifies a pair of account server systems between which data may be shared. In a variety of embodiments, sharing session data identifies a set of account server systems between which data may be shared.
[0035] At step 316, account sewer systems may be determined. Account sewer systems may be determined based on an alias token indicated in the sharing session data, the session sharing data, and/or the distributed ledger. The determined account server systems may include those account server systems authorized to share data with the account sewer system processing the request data. In a variety of embodiments, determining the account server systems include identifying the account server systems storing some or all of the distributed ledger. In many embodiments, determining the account server systems includes identifying account server systems which have been granted permission to read and/or write to the distributed ledger. The account server systems may be determined based on a set of account server systems provided by a data sharing device.
[0036] At step 318, request data may be validated. In a variety of embodiments, the sharing session data includes a set of permission data associated with a particular alias token. Validating the request data may include determining if the request data was obtained during a valid time frame as defined by a start date and/or the end date defined by the permission data. Validating the request data may include determining if the request data requests data that has been authorized to be shared as defined by the permission data. In the event that the request data does not validate, response data may not be generated and/or transmitted. Validating the request data may also include generating audit data based on the request data. Audit data may include any of a variety of data including, but not limited to, the date and/or time the request data was generated and/or obtained, information identifying the user and/or data sharing device generating and/or transmitting the request data, the account server system(s) obtaining the request data, any alias tokens associated with the request data, and/or the results of validating the request data. The audit data may be recorded on the distributed ledger and/or maintained by one or more of the account server systems.
[0037] At step 320, response data may be obtained. The response data may be received directly from an account server system. The response data may be obtained by querying a distributed ledger and/or a distributed network system. In a number of embodiments, the response data is stored using a block maintained by a distributed ledger. In many embodiments, the response data is stored as a transaction recorded using a smart contract maintained by a distributed network system. The response data may include data associated with an account determined by the alias token. The response data may include a particular subset of the determined account data. The subset of account data may be based on permission data associated with the request data The response data may be filtered and/or processed as specified in the request data. In a number of embodiments, the response data may include account data occurring within a particular date range and/or having particular characteristics. A variety of techniques for generating the obtained response data are described with respect to FIG. 4.
Authorizing Data Sharing using Smart Contracts 100381 Data sharing systems may utilize a distributed network system to store and execute smart contracts to confirm the authorization of sharing between various devices. The smart contract may be associated with an alias token that may be used to identify particular data accessible via a number of computing devices. FIG. 3B shows a flow chart of a process for obtaining data using a smart contract according to one or more aspects of the disclosure. Some or all of the steps of process 350 may be performed using one or more computing devices as described herein.
100391 At step 360, request data may be obtained. The request data may be obtained by an account server system and/or a distributed network system. The request data may identify a request to obtain data stored using one or more account server systems. The request data may be generated and/or transmitted by a data sharing device. The request data may indicate account information, such as a username, account number, email address, and/or the like, for an account maintained by an account server system. The request data may indicate one or more account server systems from which data sharing is desired. The indication may be via any data identifying an account server system, such as a domain name, uniform resource locator, Internet Protocol address, a common name of the account server system, and/or the like. The request data may indicate a smart contract address.
100401 At step 362, a smart contract address may be determined. A smart contract address may be determined based on the alias token and/or the request data. In several embodiments, a smart contract may be specific to an email address identified in the request data. The smart contract address may be a unique identifier for a smart contract stored using a distributed network system. In many embodiments, a smart contract address includes an alphanumeric string beginning with the characters "Ox". An account server system may store a mapping of an alias token and/or account identifier to a smart contract address. A data sharing device may determine a smart contract address by querying a database associated with a data sharing application executing on the data sharing device.
[0041] At step 364, a smart contract may be executed. The smart contract may be executed by sending some or all of the request data to the determined smart contract address. In a variety of embodiments, executing a smart contract includes compiling the smart contract into bytecode that may be executed by one or more nodes of a distributed network system. Any data stored using the smart contract and/or distributed ledger, such as sharing session data, alias tokens, request data, and/or response data, may be encrypted using any of a variety of encryption techniques. In several embodiments, one or more public key infrastructure (PKI) certificates may be used to encrypt data stored on the smart contract. In many embodiments, the request data may be encrypted using a public key associated with the specific account server system receiving the request data. The public key can be associated with a private key that is secret to the account server system and/or privately shared between several account server systems.
[0042] At step 366, encrypted data may be obtained. In several embodiments, the encrypted data may be obtained by processing a smart contract to identify encrypted data associated with the request data and/or identifying data indicated in the request data. In a number of embodiments, the encrypted data may be obtained by processing a smart contract to determine encrypted data which has been encrypted with a key, such as a public key, associated with a particular account sewer system and/or data sharing device. The encrypted data may be targeted toward specific data sharing devices and/or account server systems based on the encryption key used to encrypt the data. By encoding the data with a public key associated with a particular device, only devices having the private key can then decode the encoded data. In this way, the encrypted data may be stored using a publicly accessible distributed network system without allowing third parties to inspect the contents of the encrypted data. The encrypted data may be obtained by an account sewer system and/or a data sharing device. In many embodiments, an account server system may obtain encrypted data based on authorization data provided by a data sharing device. The authorization data may include a decryption key for the encrypted data generated based on the request data provided by the data sharing device. In a variety of embodiments, the request data includes the authorization data.
[0043] At step 368, an alias token may be determined. The alias token may be determined by decoding the encrypted data. The encrypted data may be decrypted with a private key associated with a computing device, such as the computing device obtaining the request data and/or providing the request data to the distributed network system. The private key may be associated with a public key used to encrypt the encrypted data. In several embodiments, the encrypted data is decrypted based on a decryption key provided in the request data and/or authorization data. Decrypting the encrypted data may also indicate one or more account server systems associated with the alias token. In a variety of embodiments, the alias token is mapped to a particular account sewer system. In several embodiments, the alias token is encrypted using a public key associated with a particular account server system such that the account server system may only decrypt alias tokens associated with sharing sessions associated with the account server system.
[0044] At step 370, response data may be obtained. The response data may be received directly from an account sewer system. The response data may be obtained by querying a distributed ledger and/or a distributed network system. In a number of embodiments, the response data is stored using a block maintained by a distributed ledger. In many embodiments, the response data is stored as a transaction recorded using a smart contract maintained by a distributed network system. The response data may include account data obtained from multiple account server systems and aggregated (or otherwise combined) to provide a single stream of response data. A variety of techniques for generating the obtained response data are described with respect to FIG. 4.
Obtaining Response Data [0045] An alias token may be used by a variety of account sewer systems to identify data responsive to a request for data and provide the response data. An account server system may transmit the response data to any of a number of computing devices. In a variety of embodiments, the response data may be stored using the smart contract and/or a distributed ledger. In several embodiments, the response data may be encrypted. FIG. 4 shows a flow chart of a process for obtaining response data according to one or more aspects of the disclosure. Some or all of the steps of process 400 may be performed using one or more computing devices as described herein.
[0046] At step 410, an alias token may be obtained. The alias token may be obtained from a data sharing device, an account server system, and/or a distributed network system as appropriate. The alias token may uniquely identify accounts associated with a data sharing device. The accounts may be managed by one or more account server systems. Each account server system may map the alias token to a particular account identifier unique to a particular account server system. The obtained alias token may include metadata indicating a variety of permission data The permission data may include, but is not limited to, a start date for sharing data, an end date for sharing data, and/or a set of data which may be shared. The permission data may be on a per-account basis and/or common to each account maintained by an account server system. In many embodiments, the permission data may be maintained by each account server system. In several embodiments, the permission data may be mapped to an alias token by the account server system. The metadata may also indicate a data source to which any response data should be transmitted.
[0047] At step 412, account data may be determined. Account data may be determined based on the alias token. In many embodiments, an account server system maintains a mapping of alias tokens to one or more accounts managed by the account server system. In this way, the account data stored on account server systems may be determined without exposing any aspects of the account data on the distributed ledger and/or in the sharing session data. The alias token may be utilized to determine the account data without requiring the sharing of login information. The mapping of an alias token to an account maintained by an account server system need not include any information regarding other accounts stored by other account server systems. In this way, the mapping of an alias token to an account is private to a particular account server system and no account server system need to be aware of account information stored on any other account sewer system in order to determine the account data. The account data may be any data associated with a user account identified in a data sharing request and maintained by an account server system. The account data may include a set of dimensions and a set of attributes. The determined account data may include a subset of the dimensions and/or attributes based on permission data identified in the metadata and/or maintained by an account server system providing the account data [0048] At step 414, a data target may be determined. The data target may be determined by an account sewer system, based on the alias token, and/or be specified in the metadata associated with the alias token. A data target may indicate a location where response data and/or audit data should be transmitted. A data target may include any of a variety of data storage locations such as, but not limited to, a data sharing device, an account server system, a distributed network system, and/or a distributed ledger. A data sharing device may obtain response data and generate a display based on the response data. An account server system may obtain response data and aggregate the response data with other data generated by the account server system and/or received from other account server systems. A variety of transformations may be performed on the aggregated data as described herein.
100491 At step 416, response data may be generated. The response data may include data associated with an account determined by the alias token. The response data may include account data obtained from a variety of account server systems. The response data may include account data obtained from multiple account server systems and aggregated (or otherwise combined) to provide a single stream of response data. The response data may include a particular subset of the determined account data. The subset of account data may be based on the permission data associated with the alias token. The response data may be filtered and/or processed using any of a variety of extract, transform, and load processes. In many embodiments, the response data may include account data occurring within a particular date range and/or having particular characteristics. The response data may include account data obtained from a variety of account sewer systems. In a number of embodiments, the response data is encrypted using a public key associated with a data sharing device (and/or a user account associated with the data sharing device) providing the request data. In a variety of embodiments, the response data is encrypted using a public key associated with an account server system.
[0050] At step 418, response data may be transmitted. The response data may be transmitted to the determined data targets. The response data may be transmitted to a data target using a variety of communication structures such as, but not limited to, an application programming interface and/or a web service. In a variety of embodiments, the response data is transmitted to a smart contract managed by a distributed network system. The distributed network system may update the smart contract to include the response data. The response data may be stored using one or more functions defined in a smart contract. An account server system and/or data sharing device may request execution of the functions by the distributed network to obtain the response data from the distributed network system. The smart contract may verify that the computing device requesting the function to be perform is associated with an authorized data sharing session as described in more detail with respect to FIG. 6. In a number of embodiments, a node in the distributed network system transmits the updated smart contract to some or all of the other nodes in the distributed network system. In a number of embodiments, the generated response data may be transmitted to one or more computing devices maintaining a distributed ledger. A data block may be generated and recorded on the distributed ledger. The data block may include the response data and a header. The header may include a variety of data including, but not limited to, a unique identifier for the data block, metadata describing the structure of the response data, an identifier of a previous (e.g. parent) block, the time the data block was generated, and/or a verification hash. The verification hash may be used to verify the data block is valid and has not been altered. In many embodiments, the verification hash may include an alphanumeric string generated based on the response data using any hashing function, such as IVID5. In a variety of embodiments, the verification hash may be based on the data block and the previous block.
100511 At step 420, audit data may be transmitted. Generating the request data may also include generating audit data based on the request data. The audit data may include any of a variety of data including, but not limited to, the date and/or time the response data was generated and/or obtained, information identifying the user and/or data sharing device generating and/or transmitting the response data, the data targets, and/or the alias token associated with the response data. In several embodiments, the audit data is encrypted using a public key associated with a data sharing device (and/or a user account associated with the data sharing device) and/or account server system receiving the response data. In several embodiments, the audit data is transmitted to the determined data targets. The audit data may be transmitted using any application programming interfaces and/or web services as described herein. In many embodiments, the audit data is recorded on a distributed ledger and/or stored using a smart contract. The audit data may be transmitted to a distributed network system and/or account server system managing the distributed ledger and/or smart contract. The audit data may be stored using a function provided by a smart contract and/or a data block maintained on a distributed ledger as described herein.
Generating Distributed Ledgers [0052] A distributed ledger allows for the efficient authorization of data sharing between a variety of computing devices without exposing confidential and/or proprietary data. FIG. 5 shows a flow chart of a process for generating a distributed ledger according to one or more aspects of the disclosure. Some or all of the steps of process 500 may be performed using one or more computing devices as described herein.
[0053] At step 510, a data sharing request may be obtained. A data sharing request may indicate that data associated with a particular data sharing device (e.g. a user account) should be shared between a set of account server systems. A data sharing request may indicate identifying information for a data sharing device with respect to one or more account sewer systems, such as a device identifier, email address, and/or digital signature. The data sharing request may also include permission data. The permission data may include, but is not limited to, a start date for sharing data, an end date for sharing data, and/or a set of data which may be shared. The permission data may be on a per-account basis and/or common to each account sewer system.
[0054] At step 512, an authorization request may be transmitted. An account server system may transmit an authorization request to a data sharing device associated with the data sharing request. An authorization request may be transmitted by each account server system indicated in the data sharing request. An authorization request may include an indication of the data sharing device providing the data sharing request and an indication of the account sewer system providing the authorization request. A variety of techniques for obtaining and processing authorization requests are described in more detail with respect to FIG. 7.
[0055] At step 514, authorization data may be obtained. The authorization data may be a specific authorization in response to the authorization request. The authorization data may be provided by a data sharing device using any of a variety of techniques, such as those described in more detail with respect to FIG. 7.
[0056] At step 516, sharing session data may be generated. The sharing session data may include, but is not limited to, a start date, an end date, the permission data, an alias token, an identifier indicated in the data sharing request, and/or a set of account sewer systems between which data is authorized to be shared. The alias token may include a unique identifier identifying a data sharing device and/or user account associated with the data sharing device. The identifying information for the data sharing device and/or user account may be indicated in the data sharing request. The unique identifier may include a statistically unique set of alphanumeric characters. If no alias token exists, a new alias token may be generated based on the data sharing request 100571 At step 518, a data block may be generated. A data block may include the sharing session data and/or header data. The header data may include a variety of data including, but not limited to, a unique identifier for the data block, metadata describing the structure of the sharing session data, an identifier of a previous (e.g. parent) block, the time the data block was generated, and/or a verification hash. The verification hash may be used to verify the data block is valid and has not been altered. In a number of embodiments, the verification hash may include an alphanumeric string generated based on the sharing session data using any hashing function, such as MD5. In several embodiments, the verification hash may be based on the data block and the previous block. In many embodiments, the format of a data block is standardized across all account server systems accessing a particular distributed ledger. The sharing session data and/or data block may be encrypted using any of a variety of security mechanisms as described herein.
100581 At step 520, a distributed ledger may be generated. A distributed ledger may be generated and stored using a set of nodes. The set of nodes may include an account server system, a set of account server systems, and/or a distributed network system. Some or all of the nodes may store the entire distributed ledger and/or a portion of the distributed ledger. The distributed ledger may store a set of data blocks. The generated data block may be provided to a node. The node may generate the distributed ledger by writing the generated data block to the distributed ledger. Each node that writes a data block to the distributed ledger may transmit an updated distributed ledger and/or the data block to some or all of the other nodes. A data sharing device and/or account server system may obtain session sharing data stored using the distributed ledger to authorize data sharing to authorize data sharing and/or share data as described herein. The distributed ledger may indicate a set of computing devices that are authorized to read from and/or write to the distributed ledger. A particular computing device may be able to read data stored on the distributed ledger but not write data to the distributed ledger and vice versa.
Generating Smart Contracts [0059] A smart contract allows for the efficient authorization of data sharing between a variety of computing devices without exposing confidential and/or proprietary data. In a variety of embodiments, a smart contract may provide encrypted data that may only be processed by authorized devices. In this way, a smart contract may be provided by a publicly accessible distributed network system and provide a secured mechanism for authorizing the sharing of data. FIG. 6 shows a flow chart of a process for generating a smart contract according to one or more aspects of the disclosure. Some or all of the steps of process 600 may be performed using one or more computing devices as described herein.
[0060] At step 610, a data sharing request may be obtained A data sharing request may indicate that data associated with a particular data sharing device (e.g. a user account) should be shared between a set of account server systems. A data sharing request may indicate identifying information for a data sharing device with respect to one or more account sewer systems, such as a device identifier, email address, and/or digital signature. The data sharing request may also include permission data. The permission data may include, but is not limited to, a start date for sharing data, an end date for sharing data, and/or a set of data which may be shared. The permission data may be on a per-account basis and/or common to each account server system. The data sharing request may include an alias token uniquely identifying the data sharing request as described herein.
[0061] At step 612, authorization data may be obtained. An account sewer system may transmit an authorization request to a data sharing device associated with the data sharing request. An authorization request may be transmitted by each account server system indicated in the data sharing request. An authorization request may include an indication of the data sharing device providing the data sharing request and an indication of the account sewer system providing the authorization request. The authorization data may be a specific authorization in response to the authorization request. The authorization data may be obtained from a data sharing device based on the authorization request. A variety of techniques for obtaining and processing authorization requests are described in more detail with respect to FIG. 7.
[0062] At step 614, sharing session data may be generated. The sharing session data may include, but is not limited to, a start date, an end date, the permission data, an alias token, an identifier indicated in the data sharing request, and/or a set of account server systems between which data is authorized to be shared. The alias token may include a unique identifier identifying a data sharing device and/or user account associated with the data sharing device. The identifying information for the data sharing device and/or user account may be indicated in the data sharing request. The unique identifier may include a statistically unique set of alphanumeric characters. If no alias token exists, a new alias token may be generated based on the data sharing request.
100631 At step 616, sharing session data may be encrypted. The session sharing data may be encrypted using a public key associated with one or more of the computing devices indicated in the data sharing request. In many embodiments, the session sharing data may be encrypted using a public key associated with an account server system that obtained the data sharing request. In a variety of embodiments, the session sharing data is encrypted using an encryption key provided in the data sharing request. In this way, the session sharing data may be decrypted and processed only by those computing devices having a valid decryption key, such as a private key associated with the account server system.
100641 At step 618, a smart contract may be generated. A smart contract may include a set of functions which may be performed by a distributed network system, a set of input data on which the functions are performed, and a set of addresses to which the output data should be transmitted. In several embodiments, a smart contract function accepts an alias token as an input and outputs encrypted sharing session data indicating a set of account server systems that are authorized to share data based on the alias token. In a number of embodiments, a smart contract function accepts an identifier of an account server system as an input and provides an output including an alias token and a set of account server systems from which the account server system may request data. In many embodiments, an input to a smart contract function includes an identification of a user account, such as an email address, and outputs encrypted sharing session data indicating an alias token and a set of account server systems from which data may be requested. A data sharing device may decrypt the sharing session data and generate a set of requests for data for each of the account server systems based on the alias token as described herein. The generated smart contract may have a unique smart contract address associated with the smart contract. In a number of embodiments, the smart contract is signed by the computing device generating the smart contract such that a different computing device is unable to modify the smart contract. The smart contract may indicate a start date and an end date. The start date and end date define a range of time in which the smart contract may be properly executed. The start date and end date may be defined for the contract as a whole and/or on a per-function basis.
100651 At step 620, a smart contract may be transmitted. The smart contract may be transmitted to a distributed network system. The distributed network system may be publicly accessible. The distributed network system may be a private distributed network system accessible only via a particular set of account sewer systems. Each computing device in the distributed network system may be a processing node for the distributed network system. A smart contract may have a unique smart contract address assigned by a node when the smart contract is obtained by a node in a distributed network system. The smart contract address may be generated based on the computing device transmitting the smart contract to the distributed network system. A smart contract may be compiled into executable bytecode by a node in the distributed network system. The node may transmit the smart contract and/or the executable bytecode to some or all of the nodes in the distributed network system. The smart contract may be transmitted to other nodes in the distributed network system in a data block. The data block may include a set of smart contracts and/or other data as described herein.
Authorizing Data Sharing [0066] A sharing request may cause a variety of account sewer systems to associate a particular alias token to accounts managed by the account server system. Account server systems may verify the sharing request so that malicious and/or improper sharing requests do not result in a data breach. FIG. 7 shows a flow chart of a process for obtaining an authorization to share data according to one or more aspects of the disclosure. Some or all of the steps of process 700 may be performed using one or more computing devices as described herein.
[0067] At step 710, an authorization request may be obtained. The authorization request may be generated based on a data sharing request as described herein. The authorization request may include a variety of data including, but not limited to, the identity of an account server system requesting authorization of a data sharing request, a summary of account information, one or more validation actions, a time at which a data sharing request was received, and/or an indication of the source of the data sharing request. In a variety of embodiments, an authorization request is obtained by a data sharing device. However, any computing device associated with an account managed by an account server system may obtain an authorization request. The authorization request may be obtained via any of a variety of communication channels such as, but not limited to, electronic mail, a short message service message, and/or a notification provided by a mobile device.
[0068] At step 712, an authorization request may be validated. An authorization request may be validated to ensure that the authorization request is sent by a valid account sharing system within a threshold time of a data sharing request. In a number of embodiments, an authorization request may indicate an internet protocol (IP) address of the sender of the authorization request. The IP address may be compared to a known list of IP addresses for the account server system indicated in the authorization request to validate that the authorization request originated from the account server system. In many embodiments, an IP address indicated in the authorization request may be provided to a domain name service to obtain a domain name associated with the IF address. The domain name may be compared to the domain name of the account server system indicated in the authorization request to verify the authorization request originated from the account server system.
[0069] At step 714, authorization data may be transmitted. Authorization data may be transmitted to an account server system based on one or more validation actions indicated in the authorization request. In several embodiments, a username and/or password may be provided to an account server system. The username and/or password may be used to verify that the account associated with the authorization request is associated with a particular user account maintained by the account server system. In a variety of embodiments, a validation action includes a one-time code that may be provided to an account server system to verify that the authorization request was properly requested. However, it should be noted that any data responsive to a validation action may be transmitted as appropriate.
Terminating Data Sharing [0070] A user may wish to terminate a previously granted sharing session. FIG. 8 shows a flow chart of a process for terminating an authorization for data sharing according to one or more aspects of the disclosure. Some or all of the steps of process 800 may be performed using one or more computing devices as described herein.
[0071] At step 810, an authorization expiration may be determined. In a variety of embodiments, a data sharing session may indicate an end date. An authorization expiration may be determined when a current date is after the indicated end date. In many embodiments, authorization expiration data may be obtained explicitly terminating a specific data sharing session. Authorization expiration data may indicate one or more pieces of sharing session data, an alias token, and/or any other identifying data as described herein. Authorization expiration data may indicate that a sharing session established with one or more account server systems should be terminated. In a number of embodiments, a subset of account sewer systems identified in the sharing session data are identified in the authorization expiration data.
[0072] At step 812, one or more distributed ledgers may be determined. A distributed ledger may store the indicated data sharing session as described herein. A distributed ledger may be determined based on the data sharing session. Multiple distributed ledgers may be maintained by multiple account sewer systems. In a variety of embodiments, a distributed ledger is determined by identifying one or more data blocks associated with the data sharing session and stored using a distributed networking system.
[0073] At step 814, sharing session data may be revoked. In several embodiments, the sharing session data may be revoked by deleting the sharing session data from the distributed ledger. In many embodiments, the sharing session data may be revoked by writing an updated block to the distributed ledger. The updated block may indicate the alias token associated with the sharing session data and that the alias token is no longer valid. In a variety of embodiments, the sharing session data may indicate an end date for the sharing session of any date preceding the date of the authorization expiration, so that the sharing session data is no longer valid.
[0074] At step 816, one or more smart contracts may be determined. A smart contract may be determined based on a smart contract address. A smart contract address may be determined based on the alias token and/or the sharing session data identified in the authorization expiration data. In several embodiments, authorization expiration data may include a smart contract address. The smart contract address may be a unique identifier for a smart contract stored using a distributed network system.
[0075] At step 818, updated smart contract data may be generated. In many embodiments, updated smart contract data includes the smart contract address of the determined smart contract and disables all functions defined in the determined smart contract.
In several embodiments, only those functions associated with particular account server systems identified in the authorization expiration data are disabled. In this way, a subset of functions of the smart contract remain operational.
100761 At step 820, updated smart contract data may be transmitted. The updated smart contract data may be transmitted to a distributed network system. In several embodiments, the distributed network system updates the smart contract data stored using the distributed network system to the transmitted updated smart contract data. In this way, the smart contract data remains accessible on the distributed network system but the disabled actions may no longer be executed by the distributed network system. In a variety of embodiments, transmitting the updated smart contract data causes a distributed network system to execute a self-destruct function defined in the smart contract. Executing a self-destruct function may cause each node in the distributed network system to remove the smart contract from the data stored on each node. In many embodiments, the self-destruct function may only be executed if the updated smart contract data is obtained by the distributed network system.
[0077] One or more aspects discussed herein may be embodied in computer-usable or readable data and/or computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices as described herein. Generally, program modules include routines, programs, objects, components, data structures, and the like. that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device. The modules may be written in a source code programming language that is subsequently compiled for execution, or may be written in a scripting language such as (but not limited to) HTML or XML. The computer executable instructions may be stored on a computer readable medium such as a hard disk, optical disk, removable storage media, solid-state memory, RAM, and the like. As will be appreciated by one of skill in the art, the functionality of the program modules may be combined or distributed as desired in various embodiments. In addition, the functionality may be embodied in whole or in part in firmware or hardware equivalents such as integrated circuits, field programmable gate arrays (FPGA), and the like. Particular data structures may be used to more effectively implement one or more aspects discussed herein, and such data structures are contemplated within the scope of computer executable instructions and computer-usable data described herein. Various aspects discussed herein may be embodied as a method, a computing device, a system, and/or a computer program product.
[0078] Although the present invention has been described in certain specific aspects, many additional modifications and variations would be apparent to those skilled in the art. In particular, any of the various processes described above may be performed in alternative sequences and/or in parallel (on different computing devices) in order to achieve similar results in a manner that is more appropriate to the requirements of a specific application. It is therefore to be understood that the present invention may be practiced otherwise than specifically described without departing from the scope and spirit of the present invention. Thus, embodiments of the present invention should be considered in all respects as illustrative and not restrictive. Accordingly, the scope of the invention should be determined not by the embodiments illustrated, but by the appended claims and their equivalents.
[0079] The following numbered items are disclosed herein Claims as filed for US 16/431299 I A method, comprising: obtaining, by a server system and from a requesting system, request data comprising a user account identifier associated with an account maintained by the server system and an indication of desired data; determining, by the server system, an alias token associated with the user account identifier; determining, by the server system, at least one related server system based on a distributed ledger, wherein the distributed ledger comprises a pairwi se mapping of each related server system to the server system; transmitting, by the server system and to each related server system, a message comprising the alias token identified in the distributed ledger and the indication of desired data; obtaining, by the server system and from each related server system, at least one response component comprising data corresponding to the indication of desired data and associated with the alias token; generating, by the server system, account data based on the indication of desired data; generating, by the server system, response data based on the indication of desired data, wherein the response data comprises the at least one response component and the account data; and transmitting, by the sewer system, the response data.
2. The method of item 1, further comprising: obtaining, by the server system and from a third-party sewer system, a request for account information, wherein the request for account information comprises a second alias token; generating, by the sewer system, a second distributed ledger comprising a mapping of the third-party server system to the server system; and transmitting, by the server system and to the third-party server system, the account information, 3. The method of item 1, further comprising: transmitting, by the server system and to a computing device, a verification request comprising an identification of a third-party server system; obtaining, by the server system and from the computing device, sharing request response data; and when the sharing request response data indicates that account information should be shared, transmitting the account information.
4. The method of item 1, wherein the distributed ledger comprises a start date and an end date for each pairwi se mapping of the server system to each related server system.
5. The method of item 1, wherein: the distributed ledger comprises permission data associated with the user account identifier; and generating the account data is further based on the permission data.
6. The method of item 1, further comprising transmitting the response data to a computing device, wherein the response data is usable to generate output data comprising the account data and the at least one response component.
The method of item 1, wherein the distributed ledger is stored using the server system.
8 The method of item 1, wherein the distributed ledger is stored using at least one of the at least one related server system 9. The method of item 1, wherein the distributed ledger is stored using a distributed network system 10. The method of item 1, further comprising: obtaining, by the sewer system, a sharing request comprising an account identifier, a start date, an end date, a set of permissions, and an indication of a related sewer system; generating, by the server system, the alias token; generating, by the server system, a transaction block comprising the account identifier, the start date, the end date, the set of permissions, the indication of the related server system, and the alias token; and recording, by the sewer system, the transaction Nock on the distributed ledger.
11. A computing device, comprising: one or more processors; and memory storing instructions that, when executed by the one or more processors, cause the computing device to: obtain, from a third-party sewer system, a request for account information, wherein the request for account information comprises an alias token; transmit, to a computing device, a verification request comprising an identification of the third-party server system obtain sharing request response data comprising an account identifier; and when the sharing request response data indicates that account information should be shared: generate a distributed ledger; generate a transaction block comprising a mapping of the third-party server system to the system, the alias token, and the account identifier; record the transaction block on the distributed ledger; and transmit, to the third-party sewer system, the account information.
12. The computing device of item 11, wherein: the sharing request response data further comprises a start date and an end date; and the transaction block further comprises the start date and the end date.
13. The computing device of item 11, wherein: the sharing request response data further comprises permission data associated with the account information; and the transaction block further comprises the permission data.
14. The computing device of item 11 wherein the distributed ledger is stored using the system.
15. The computing device of item 11, wherein the distributed ledger is stored using the third-party server system.
16. The computing device of item 11, wherein the distributed ledger is stored using a distributed network system.
17. A non-transitory machine-readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform steps comprising: obtaining request data comprising an account identifier and an indication of desired data; determining an alias token associated with the account identifier; determining a transaction block identifying a related server system based on the alias token, wherein the transaction block comprises a start date and an end date; determining a current date when the request data was obtained; and when the current date is after the start date and before the end date: transmitting, to the related server system, a message comprising the alias token and the indication of desired data; and obtaining, from the related server system, a response component comprising data corresponding to the indication of desired data and associated with the alias token; and generating response data based on the request data, wherein the response data comprises the response component when the current date is after the start date and before the end date.
18. The non-transitory machine-readable medium of item 17, wherein the instructions further cause the one or more processors to transmit the response data to a computing device, wherein the response data is usable to generate output data comprising the response data.
19. The non-transitory machine-readable medium of item 17, wherein the instructions further cause the one or more processors to determine the transaction block by querying a distributed ledger to identify the transaction block based on the related server system.
20. The non-transitory machine-readable medium of item 17, wherein: the transaction block further comprises permission data; and the instructions further cause the one or more processors to generate the response data based on the permission data Granted claims of US 16/431409 A method, comprising: obtaining, by a server system and from a requesting system, request data comprising a user account identifier associated with an account maintained by the server system and an indication of desired data, wherein the requesting system comprises a client device associated with the account; determining, by the server system, an alias token associated with the user account identifier; determining, by the server system, at least one smart contract maintained using a distributed ledger stored using a distributed network system, wherein the smart contract: is associated with the alias token; comprises a start date and an end date for each server system associated with the alias token; and comprises permission data associated with each server system associated with the alias token; transmitting, by the server system and to the distributed network system, a request to execute the smart contract; transmitting, by the distributed network system and to at least one related sewer system, a message generated based on the smart contract and comprising the alias token identified and the indication of desired data; obtaining, by the sewer system and directly from each related sewer system, at least one response component comprising data corresponding to the indication of desired data and associated with the alias token; generating, by the server system, account data based on the indication of desired data and the permission data; generating, by the sewer system, response data based on the request for data, wherein the response data comprises the at least one response component and the account data; and transmitting, by the sewer system to the client device, the response data 2. The method of item 1, further comprising: obtaining, by the sewer system and from a third-party sewer system, a request for account information, wherein the request for account information comprises a second alias token; updating, by the sewer system, the smart contract based on the third-party server system and the second alias token; and transmitting, by the server system and to the distributed network system, the updated smart contract.
3. The method of item 2, further comprising: transmitting, by the server system and to a computing device, a verification request comprising an identification of the third-party server system; obtaining, by the server system and from the computing device, verification request response data; and when the verification request response data indicates that account information should be shared, updating the smart contract 4 -5.
6. The method of item 1, wherein the response data is usable to generate output data comprising the account data and the at least one response component.
The method of item 1, wherein: the distributed network system comprises a set of nodes communicating via a peer-topeer network; and the set of nodes provides a decentralized virtual machine.
8. The method of item 7, wherein: the distributed network system executes the smart contract by: obtaining, by at least one node in the set of nodes, the request to execute the smart contract; validating, by the at least one node, the request and the smart contract; generating, by the at least one node, bytecode based on the smart contract; executing, by the at least one node and using the virtual machine, the bytecode to generate a set of requests, each request identifying a related server system in the at least one related server systems and the alias token; generating, by the at least one node, a ledger transaction comprising the set of requests; and transmitting, to each node in the set of nodes, the ledger transaction; and the message transmitted by the distributed network system to each related server system comprises the ledger transaction.
9. The method of item 1, further comprising: obtaining, by the server system, a sharing request comprising a second account identifier, a second start date, a second end date, a second set of permissions, and an indication of a second related server system; generating, by the server system, a second smart contract comprising the second account identifier, the second start date, the second end date, the second set of permissions, the indication of the second related server system, and the alias token; and recording the second smart contract on the distributed ledger using the distributed network system 10. The method of item 9, wherein the second smart contract is recorded by: transmitting, by the server system and to the distributed network system, the second smart contract; validating, by the distributed network system, the second smart contract; and recording, by the distributed network system, the second smart contract. -20.
21. A device, comprising: a processor; and a memory in communication with the processor and storing instructions that, when executed by the processor, cause the device to: obtain, from a requesting system, request data comprising a user account identifier associated with an account maintained by the device and an indication of desired data, wherein the requesting system comprises a client device associated with the account; determine an alias token associated with the user account identifier; determine at least one smart contract maintained using a distributed ledger stored using a distributed network system, wherein the smart contract: is associated with the alias token; comprises a start date and an end date for each server system associated with the alias token; and comprises permission data associated with each server system associated with the alias token; transmit, to the distributed network system, a request to execute the smart contract; transmit, to at least one related server system, a message generated based on the smart contract and comprising the alias token identified and the indication of desired data obtain, directly from each related server system, at least one response component comprising data corresponding to the indication of desired data and associated with the alias token; generate account data based on the indication of desired data and the permission data; generate response data based on the request for data, wherein the response data comprises the at least one response component and the account data; and transmit, to the client device, the response data.
22. The device of item 21, wherein the instructions, when executed by the processor, further cause the device to: obtain, from a third-party server system, a request for account information, wherein the request for account information comprises a second alias token; update the smart contract based on the third-party server system and the second alias token; and transmit, to the distributed network system, the updated smart contract.
23. The device of item 22, wherein the instructions, when executed by the processor, further cause the device to: transmit, to a computing device, a verification request comprising an identification of the third-party server system; obtain, from the computing device, verification request response data; and when the verification request response data indicates that account information should be shared, update the smart contract.
24. The device of item 21, wherein the response data is usable to generate output data comprising the account data and the at least one response component.
25. The device of item 21, wherein: the distributed network system comprises a set of nodes communicating via a peer-topeer network; and the set of nodes provides a decentralized virtual machine.
26. The device of item 25, wherein: the distributed network system executes the smart contract by: obtaining, by at least one node in the set of nodes, the request to execute the smart contract; validating, by the at least one node, the request and the smart contract; generating, by the at least one node, bytecode based on the smart contract; executing, by the at least one node and using the virtual machine, the bytecode to generate a set of requests, each request identifying a related server system in the at least one related server systems and the alias token; generating, by the at least one node, a ledger transaction comprising the set of requests; and transmitting, to each node in the set of nodes, the ledger transaction; and the message transmitted by the distributed network system to each related server system comprises the ledger transaction.
27. The device of item 21, wherein the instructions, when executed by the processor, further cause the device to: obtain a sharing request comprising a second account identifier, a second start date, a second end date, a second set of permissions and an indication of a second related server system, generate a second smart contract comprising the second account identifier, the second start date, the second end date, the second set of permissions, the indication of the second related server system, and the alias token, and record the second smart contract on the distributed ledger using the distributed network system.
28. The device of item 27, wherein the second smart contract is recorded by: transmitting, to the distributed network system, the second smart contract; validating the second smart contract; and recording the second smart contract.
29. A non-transitory machine-readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform steps comprising: obtaining, from a requesting system, request data comprising a user account identifier associated with an account maintained by a server system and an indication of desired data, wherein the requesting system comprises a client device associated with the account; determining an alias token associated with the user account identifier; determining at least one smart contract maintained using a distributed ledger stored using a distributed network system, wherein the smart contract: is associated with the alias token; comprises a start date and an end date for each server system associated with the alias token; and comprises permission data associated with each server system associated with the alias token; transmitting, to the distributed network system, a request to execute the smart contract; transmitting, to at least one related sewer system, a message generated based on the smart contract and comprising the alias token identified and the indication of desired data; obtaining, directly from each related server system, at least one response component comprising data corresponding to the indication of desired data and associated with the alias token; generating account data based on the indication of desired data and the permission data; generating response data based on the request for data, wherein the response data comprises the at least one response component and the account data, and transmitting, to the client device, the response data.
30. The non-transitory machine-readable medium of item 29, wherein the instructions further cause the one or more processors to perform steps comprising: obtaining, from a third-party sewer system, a request for account information, wherein the request for account information comprises a second alias token; updating the smart contract based on the third-party server system and the second alias token; and transmitting, to the distributed network system, the updated smart contract.
31. The non-transitory machine-readable medium of item 30, wherein the instructions further cause the one or more processors to perform steps comprising: transmitting, to a computing device, a verification request comprising an identification of the third-party server system; obtaining, from the computing device, verification request response data; and when the verification request response data indicates that account information should be shared, updating the smart contract.
32. The non-transitory machine-readable medium of item 29, wherein: the distributed network system comprises a set of nodes communicating via a peer-topeer network; and the set of nodes provides a decentralized virtual machine.
[0080] Also disclosed herein is a machine-readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform steps comprising any of the numbered items above. Further disclosed herein is a device, comprising a processor, and a memory in communication with the processor and storing instructions that, when executed by the processor, cause the device to perform the method of any of the numbered items listed above.
Examples of the present disclosure are set out in the following numbered clauses.
A method, comprising: obtaining, by a server system, a sharing request comprising an account identifier and an indication of at least one related server system; generating, by the server system, an alias token based on the account identifier; generating, by the server system, a transaction block comprising the account identifier, the indication of the at least one related server system, and the alias token; recording, by the server system, the transaction block on a distributed ledger; obtaining, by the sewer system and from a requesting system, request data comprising a user account identifier associated with an account maintained by the server system and an indication of desired data; identifying, by the server system and based on the request data, the alias token associated with the user account identifier; determining, by the server system, at least one related server system based on the distributed ledger, wherein the distributed ledger comprises a mapping of each of the at least one related server systems to the server system, transmitting, by the server system and to each of the at least one related server systems, a message comprising the alias token identified in the distributed ledger and the indication of desired data; obtaining, by the server system and from each of the at least one related server systems, at least one response component comprising data corresponding to the indication of desired data and associated with the alias token; generating, by the server system, account data based on the indication of desired data; generating, by the server system, response data based on the indication of desired data, wherein the response data comprises the at least one response component and the account data; and transmitting, by the server system, the response data.
2. The method of clause 1, further comprising: obtaining, by the server system and from a third-party server system, a request for account information, wherein the request for account information comprises a second alias token; generating, by the server system, a second distributed ledger comprising a mapping of the third-party server system to the server system; and transmitting, by the sewer system and to the third-party sewer system, the account information.
The method of clause 1, further comprising: transmitting, by the server system and to a computing device, a verification request comprising an identification of a third-party server system; obtaining, by the sewer system and from the computing device, verification request response data; and when the verification request response data indicates that account information should be shared, transmitting the account information.
4. The method of clause 1, wherein the distributed ledger comprises a start date and an end date for each mapping of the sewer system to each of the at least one related sewer systems The method of clause 1, wherein: the distributed ledger comprises permission data associated with the user account identifier; and generating the account data is further based on the permission data.
6. The method of clause 1, further comprising transmitting the response data to a computing device, wherein the response data is usable to generate output data comprising the account data and the at least one response component.
The method of clause 1, wherein the distributed ledger is stored using the sewer system.
8. The method of clause 1, wherein the distributed ledger is stored using at least one of the at least one related sewer system.
9. The method of clause 1, wherein the distributed ledger is stored using a distributed network system 10. The method of clause 1, wherein: the sharing request further comprises a start date, an end date, arid a set of permissions; and the transaction block further comprises the start date, the end date, and the set of permissions.
11. A computing device, comprising: one or more processors; and memory storing instructions that, when executed by the one or more processors cause the computing device to: obtain, from a third-party sewer system, a request for account information, wherein the request for account information comprises an alias token; transmit, to a computing device, a verification request comprising an identification of the third-party server system; obtain verification request response data comprising an account identifier; when the verification request response data indicates that account information should be shared: generate a distributed ledger; generate a transaction block comprising a mapping of the third-party sewer system to the system, the alias token, and the account identifier; record the transaction block on the distributed ledger; and transmit, to the third-party sewer system, the account information; obtain, from a requesting system, request data comprising a user account identifier associated with an account maintained by the server system and an indication of desired data; identify, based on the request data, the alias token associated with the user account identifier; determine at least one related sewer system based on the alias token; transmit, to each of the at least one related sewer systems, a message comprising the alias token and the indication of desired data; obtain, from each of the at least one related sewer systems, at least one response component comprising data corresponding to the indication of desired data and associated with the alias token; generate response data based on the indication of desired data, wherein the response data comprises the at least one response component; and transmit, to the requesting system, the response data.
12. The computing device of clause 11, wherein: the verification request response data further comprises a start date and an end date. and the transaction block further comprises the start date and the end date 13. The computing device of clause 11, wherein: the verification request response data further comprises permission data associated with the account information; and the transaction block further comprises the permission data 14. The computing device of clause 11 wherein the distributed ledger is stored using the system.
15. The computing device of clause 11, wherein the distributed ledger is stored using the third-party server system 16. The computing device of clause 11, wherein the distributed ledger is stored using a distributed network system.
17. A machine-readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform steps comprising: obtaining a sharing request comprising an account identifier and an indication of at least one related server system; generating an alias token based on the account identifier; generating a transaction block comprising the account identifier, the indication of the at least one related server system, and the alias token; recording the transaction block on a distributed ledger; obtaining request data comprising an account identifier and an indication of desired data; identifying, based on the request data, the alias token associated with the account identifier; determining a transaction block identifying a related server system based on the alias token, wherein the transaction block comprises a start date and an end date; determining a current date when the request data was obtained; and when the current date is after the start date and before the end date: transmitting, to the related server system, a message comprising the alias token and the indication of desired data; and obtaining, from the related server system, a response component comprising data corresponding to the indication of desired data and associated with the alias token; and generating response data based on the request data, wherein the response data comprises the response component when the current date is after the start date and before the end date.
18. The machine-readable medium of clause 17, wherein the instructions further cause the one or more processors to transmit the response data to a computing device, wherein the response data is usable to generate output data comprising the response data.
19. The machine-readable medium of clause 17, wherein the instructions further cause the one or more processors to determine the transaction block by querying the distributed ledger to identify the transaction block based on the related server system.
20. The machine-readable medium of clause 17, wherein: the transaction block further comprises permission data; and the instructions further cause the one or more processors to generate the response data based on the permission data.

Claims (20)

  1. A method, comprising: obtaining, by a server system and from a requesting system, request data comprising: a user account identifier associated with an account maintained by the server system, a smart contract address, and an indication of desired data, wherein the requesting system comprises a client device associated with the account; determining, by the server system, an alias token associated with the user account identifier; determining, by the server system and based on the smart contract address, at least one smart contract maintained using a distributed ledger stored using a distributed network system, wherein the smart contract is associated with the alias token; transmitting, by the server system and to the distributed network system, a request to execute the smart contract; transmitting, by the distributed network system and to at least one related server system, a message generated based on the smart contract and comprising the alias token identified and the indication of desired data; obtaining, by the server system and directly from each related server system, at least one response component comprising data corresponding to the indication of desired data and associated with the alias token; generating, by the server system, account data based on the indication of desired data; generating, by the server system, response data based on the request for data, wherein the response data comprises the at least one response component and the account data; and transmitting, by the sewer system to the client device, the response data.
  2. 2. The method of claim 1, further comprising: obtaining, by the server system and from a third-party server system, a request for account information, wherein the request for account information comprises a second alias token; updating, by the server system, the smart contract based on the third-party server system and the second alias token, and transmitting, by the sewer system and to the distributed network system, the updated smart contract.
  3. The method of claim 2, further comprising: transmitting, by the server system and to a computing device, a verification request comprising an identification of the third-party server system; obtaining, by the server system and from the computing device, verification request response data; and when the verification request response data indicates that account information should be shared, updating the smart contract.
  4. 4. The method of any preceding claim, wherein the smart contract comprises a start date and an end date for each server system associated with the alias token.
  5. 5. The method of any preceding claim, wherein: the smart contract comprises permission data associated with each server system associated with the alias token; and generating the account data is further based on the permission data.
  6. 6. The method of any preceding claim, further comprising transmitting the response data to a computing device, wherein the response data is usable to generate output data comprising the account data and the at least one response component.
  7. 7. The method of any preceding claim, wherein: the distributed network system comprises a set of nodes communicating via a peer-topeer network, and the set of nodes provides a decentralized virtual machine.
  8. The method of claim 7, wherein: the distributed network system executes the smart contract by: obtaining, by at least one node in the set of nodes, the request to execute the smart contract; validating, by the at least one node, the request and the smart contract; generating, by the at least one node, bytecode based on the smart contract; executing, by the at least one node and using the decentralized virtual machine, the bytecode to generate a set of requests, each request identifying a related server system in the at least one related server systems and the alias token; generating, by the at least one node, a ledger transaction comprising the set of requests; and transmitting, to each node in the set of nodes, the ledger transaction; and the message transmitted by the distributed network system to each related server system comprises the ledger transaction.
  9. The method of any preceding claim, further comprising: obtaining, by the server system, a sharing request comprising a second account identifier, a start date, an end date, a set of permissions, and an indication of a related server system; generating, by the server system, the alias token; generating, by the server system, a second smart contract comprising the second account identifier, the start date, the end date, the set of permissions, the indication of the related server system, and the alias token; and recording the second smart contract on the distributed ledger using the distributed network system
  10. 10. The method of claim 9, wherein the second smart contract is recorded by: transmitting, by the server system and to the distributed network system, the second smart contract; validating, by the distributed network system, the second smart contract; and recording, by the distributed network system, the second smart contract.
  11. 11. A computing device, comprising: one or more processors; and a memory in communication with the processor and storing instructions that, when executed by the one or more processors, cause the computing device to: obtain, by a server system and from a requesting system, request data comprising a user account identifier associated with an account maintained by the device, a smart contract address and an indication of desired data, wherein the requesting system comprises a client device associated with the account; determine, by the server system, an alias token associated with the user account identifier; determine, by the sewer system and based on the smart contract address, at least one smart contract maintained using a distributed ledger stored using a distributed network system, wherein the smart contract is associated with the alias token; transmit, by the sewer system and to the distributed network system, a request to execute the smart contract; transmit, by the distributed network system and to at least one related server system, a message generated based on the smart contract and comprising the alias token identified and the indication of desired data; obtain, by the server system and directly from each related sewer system, at least one response component comprising data corresponding to the indication of desired data and associated with the alias token; generate, by the server system, account data based on the indication of desired data generate, by the sewer system, response data based on the request for data, wherein the response data comprises the at least one response component and the account data; and transmit, to the client device, the response data.
  12. 12. The computing device of claim 11, wherein the instructions, when executed by the one or more processors, further cause the computing device to: transmit, by the server system and to a computing device, a verification request comprising an identification of third-party sewer system; obtain verification request response data comprising an account identifier, wherein: the verification request response data further comprises a start date and an end date; and the smart contract further comprises the start date and the end date.
  13. 13. The computing device of claim 12, wherein: the verification request response data further comprises permission data associated with the account identifier; and the smart contract further comprises the permission data.
  14. 14. The computing device of claim 11 or claim 12, wherein the smart contract is recorded by: transmitting, to the distributed network system, the smart contract; validating, by the distributed network system, the smart contract, and recording, by the distributed network system, the smart contract
  15. 15. The computing device of any of claims 11 to 14, wherein: the distributed network system comprises a set of nodes communicating via a peer-topeer network; and the set of nodes provides a decentralized virtual machine.
  16. 16. The computing device of any of claims 11 to 15, wherein the instructions, when executed by the one or more processors, further cause the computing device to: obtain, from a second third-party server system, a second request for account information, wherein the request for account information comprises a second alias token; update the smart contract based on the second third-party server system and the second alias token; and transmit, to the distributed network system, the updated smart contract.
  17. 17. A machine-readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform steps comprising: obtaining, by a server system and from a requesting system, request data comprising: an account identifier associated with an account maintained by a server system, a smart contract address and an indication of desired data from the account, wherein the requesting system comprises a client device associated with the account; determining an alias token associated with the account identifier; determining, based on the smart contract address, at least one smart contract identifying a related server system based on the alias token, wherein the smart contract comprises a start date and an end date, wherein the smart contract is maintained using a distributed ledger stored using a distributed network system, wherein the smart contract is associated with the alias token, transmitting, to the distributed network system, a request to execute the smart contract, transmitting, to at least one related server system, a message generated based on the smart contract and comprising the alias token identified and the indication of desired data, obtaining, directly from each related server system, at least one response component comprising data corresponding to the indication of desired data and associated with the alias token; generating response data based on the request for data, wherein the response data comprises the response component when the current date is after the start date and before the end date; and transmitting, to the client device, the response data
  18. 18. The machine-readable medium of claim 17, wherein the instructions further cause the one or more processors to transmit the response data to a computing device, wherein the response data is usable to generate output data comprising the response data.
  19. 19. The machine-readable medium of claim 17 or claim 18, wherein: the instructions further cause the one or more processors to transmit the message to the distributed network system; and the distributed network system executes the smart contract based on the message.
  20. 20. The machine-readable medium of claim 19, wherein: the instructions further cause the one or more processors to obtain the response component by querying the smart contract stored on the ledger; and the ledger is stored by the distributed network system.
GB2213494.4A 2019-06-04 2020-06-04 Data sharing via distributed ledgers Active GB2610072B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US16/431,299 US10474834B1 (en) 2019-06-04 2019-06-04 Data sharing via distributed ledgers
US16/431,409 US10554406B1 (en) 2019-06-04 2019-06-04 Authorized data sharing using smart contracts
GB2008446.3A GB2590520B (en) 2019-06-04 2020-06-04 Data sharing via distributed ledgers

Publications (3)

Publication Number Publication Date
GB202213494D0 GB202213494D0 (en) 2022-10-26
GB2610072A true GB2610072A (en) 2023-02-22
GB2610072B GB2610072B (en) 2023-10-04

Family

ID=71615935

Family Applications (2)

Application Number Title Priority Date Filing Date
GB2008446.3A Active GB2590520B (en) 2019-06-04 2020-06-04 Data sharing via distributed ledgers
GB2213494.4A Active GB2610072B (en) 2019-06-04 2020-06-04 Data sharing via distributed ledgers

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GB2008446.3A Active GB2590520B (en) 2019-06-04 2020-06-04 Data sharing via distributed ledgers

Country Status (1)

Country Link
GB (2) GB2590520B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170243215A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System for external secure access to process data network
US20190028277A1 (en) * 2017-07-24 2019-01-24 International Business Machines Corporation Anonymous consent and data sharing on a blockchain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3622660B1 (en) * 2017-05-12 2023-08-30 Massachusetts Institute of Technology Systems and methods for crowdsourcing, analyzing, and/or matching personal data
EP3953834A4 (en) * 2019-04-12 2023-01-04 Symbiont.io, Inc. Systems, devices, and methods for dlt-based data management platforms and data products

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170243215A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System for external secure access to process data network
US20190028277A1 (en) * 2017-07-24 2019-01-24 International Business Machines Corporation Anonymous consent and data sharing on a blockchain

Also Published As

Publication number Publication date
GB2610072B (en) 2023-10-04
GB2590520B (en) 2022-11-02
GB202008446D0 (en) 2020-07-22
GB2590520A8 (en) 2022-05-11
GB202213494D0 (en) 2022-10-26
GB2590520A (en) 2021-06-30

Similar Documents

Publication Publication Date Title
US11196561B2 (en) Authorized data sharing using smart contracts
US11829502B2 (en) Data sharing via distributed ledgers
US11475137B2 (en) Distributed data storage by means of authorisation token
US20200329041A1 (en) Cross-region requests
US11303449B2 (en) User device validation at an application server
US10680827B2 (en) Asymmetric session credentials
US9813241B2 (en) Encrypted file storage
US11329962B2 (en) Pluggable cipher suite negotiation
US20200084045A1 (en) Establishing provenance of digital assets using blockchain system
EP3585032B1 (en) Data security service
US10182044B1 (en) Personalizing global session identifiers
US9973481B1 (en) Envelope-based encryption method
US10560441B2 (en) Data security operations with expectations
US10277569B1 (en) Cross-region cache of regional sessions
JP2016513945A (en) Establishing reliability between applications on a computer
US11595398B1 (en) Access control for named domain networking
US11146552B1 (en) Decentralized application authentication
EP3839791B1 (en) Identification and authorization of transactions via smart contracts
Chinnasamy et al. A scalable multilabel‐based access control as a service for the cloud (SMBACaaS)
US20240048361A1 (en) Key Management for Cryptography-as-a-service and Data Governance Systems
GB2610072A (en) Data sharing via distributed ledgers
US20240048380A1 (en) Cryptography-as-a-Service
US20240048532A1 (en) Data exchange protection and governance system
US20220321338A1 (en) Systems and methods for dynamically encrypting redirect requests