Consent Management

There is provided a computer-implemented method for a first party to control permission for access to first party information to a second party while preserving privacy, the method comprising the following steps taken by the first party at first party computing apparatus: establishing with the secon...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Patel, Neelam, Sheedy, Ben, Radley, James, Lloyd, Wayne
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Patel, Neelam
Sheedy, Ben
Radley, James
Lloyd, Wayne
description There is provided a computer-implemented method for a first party to control permission for access to first party information to a second party while preserving privacy, the method comprising the following steps taken by the first party at first party computing apparatus: establishing with the second party a set of information classes for first party information to be provided to the second party and establishing permitted use for the first party information in the set of information classes; providing a first party consent to the permitted use for the first party information in the set of information classes, encrypting the first party consent for inspection limited to the first party and the second party, and providing the first party consent to the second party in a first party digitally signed consent grant structure for the second party to decrypt, validate and sign the first party consent and for a consent validating party to store the first and second party digitally signed consent grant structure on a blockchain. There is also provided a computer-implemented method for a second party to obtain permission from a first party for access to first party information while preserving privacy. There is also provided a computer-implemented method for a consent validating party to manage permissions given by a first party for access to first party information to a second party while preserving privacy.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2022173913A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2022173913A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2022173913A13</originalsourceid><addsrcrecordid>eNrjZBByzs8rTs0rUfBNzEtMT80FMnkYWNMSc4pTeaE0N4Oym2uIs4duakF-fGpxQWJyal5qSXxosJGBkZGhubGlobGjoTFxqgB1YSDg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Consent Management</title><source>esp@cenet</source><creator>Patel, Neelam ; Sheedy, Ben ; Radley, James ; Lloyd, Wayne</creator><creatorcontrib>Patel, Neelam ; Sheedy, Ben ; Radley, James ; Lloyd, Wayne</creatorcontrib><description>There is provided a computer-implemented method for a first party to control permission for access to first party information to a second party while preserving privacy, the method comprising the following steps taken by the first party at first party computing apparatus: establishing with the second party a set of information classes for first party information to be provided to the second party and establishing permitted use for the first party information in the set of information classes; providing a first party consent to the permitted use for the first party information in the set of information classes, encrypting the first party consent for inspection limited to the first party and the second party, and providing the first party consent to the second party in a first party digitally signed consent grant structure for the second party to decrypt, validate and sign the first party consent and for a consent validating party to store the first and second party digitally signed consent grant structure on a blockchain. There is also provided a computer-implemented method for a second party to obtain permission from a first party for access to first party information while preserving privacy. There is also provided a computer-implemented method for a consent validating party to manage permissions given by a first party for access to first party information to a second party while preserving privacy.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220602&amp;DB=EPODOC&amp;CC=US&amp;NR=2022173913A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76293</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220602&amp;DB=EPODOC&amp;CC=US&amp;NR=2022173913A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Patel, Neelam</creatorcontrib><creatorcontrib>Sheedy, Ben</creatorcontrib><creatorcontrib>Radley, James</creatorcontrib><creatorcontrib>Lloyd, Wayne</creatorcontrib><title>Consent Management</title><description>There is provided a computer-implemented method for a first party to control permission for access to first party information to a second party while preserving privacy, the method comprising the following steps taken by the first party at first party computing apparatus: establishing with the second party a set of information classes for first party information to be provided to the second party and establishing permitted use for the first party information in the set of information classes; providing a first party consent to the permitted use for the first party information in the set of information classes, encrypting the first party consent for inspection limited to the first party and the second party, and providing the first party consent to the second party in a first party digitally signed consent grant structure for the second party to decrypt, validate and sign the first party consent and for a consent validating party to store the first and second party digitally signed consent grant structure on a blockchain. There is also provided a computer-implemented method for a second party to obtain permission from a first party for access to first party information while preserving privacy. There is also provided a computer-implemented method for a consent validating party to manage permissions given by a first party for access to first party information to a second party while preserving privacy.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZBByzs8rTs0rUfBNzEtMT80FMnkYWNMSc4pTeaE0N4Oym2uIs4duakF-fGpxQWJyal5qSXxosJGBkZGhubGlobGjoTFxqgB1YSDg</recordid><startdate>20220602</startdate><enddate>20220602</enddate><creator>Patel, Neelam</creator><creator>Sheedy, Ben</creator><creator>Radley, James</creator><creator>Lloyd, Wayne</creator><scope>EVB</scope></search><sort><creationdate>20220602</creationdate><title>Consent Management</title><author>Patel, Neelam ; Sheedy, Ben ; Radley, James ; Lloyd, Wayne</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2022173913A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Patel, Neelam</creatorcontrib><creatorcontrib>Sheedy, Ben</creatorcontrib><creatorcontrib>Radley, James</creatorcontrib><creatorcontrib>Lloyd, Wayne</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Patel, Neelam</au><au>Sheedy, Ben</au><au>Radley, James</au><au>Lloyd, Wayne</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Consent Management</title><date>2022-06-02</date><risdate>2022</risdate><abstract>There is provided a computer-implemented method for a first party to control permission for access to first party information to a second party while preserving privacy, the method comprising the following steps taken by the first party at first party computing apparatus: establishing with the second party a set of information classes for first party information to be provided to the second party and establishing permitted use for the first party information in the set of information classes; providing a first party consent to the permitted use for the first party information in the set of information classes, encrypting the first party consent for inspection limited to the first party and the second party, and providing the first party consent to the second party in a first party digitally signed consent grant structure for the second party to decrypt, validate and sign the first party consent and for a consent validating party to store the first and second party digitally signed consent grant structure on a blockchain. There is also provided a computer-implemented method for a second party to obtain permission from a first party for access to first party information while preserving privacy. There is also provided a computer-implemented method for a consent validating party to manage permissions given by a first party for access to first party information to a second party while preserving privacy.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2022173913A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Consent Management
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T05%3A38%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Patel,%20Neelam&rft.date=2022-06-02&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2022173913A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true