Sign In to Follow Application
View All Documents & Correspondence

“Systems And Methods For Blockchain Based Information Management”

Abstract: Methods Systems, and equipment, as well as laptop programs encoded on computer memory media, for playacting knowledge management. one among the strategies includes: getting authentication data of a login user; generating a digital abstract of the authentication information of the login user; and authenticating the login user supported a comparison between the digital abstract of the authentication information of the login user and one or additional digital abstracts keep on a blockchain.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
07 December 2019
Publication Number
24/2021
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
ipr@optimisticip.com
Parent Application

Applicants

MESBRO TECHNOLOGIES PRIVATE LIMITED
Flat no C/904, Geomatrix Dev, Plot no 29, Sector 25, Kamothe, Raigarh-410209, Maharashtra, India

Inventors

1. Mr. Bhaskar Vijay Ajgaonkar
Flat no C/904, Geomatrix Dev, Plot no 29, Sector 25, Kamothe, Raigarh-410209, Maharashtra, India

Specification

Claims:We Claim:
1. A system of computer-implemented technique for information management, comprising:
a. getting authentication data of a login user
b. authenticating the login user supported a comparison between the digital abstract of the authentication data of the login user
2. The method of claim 1, wherein the authentication data identification related to the login user.
3. The method of claim 2, wherein the authentication data related to the account identification.
4. The method of claim 3, wherein the digital abstract of the authentication data having a hash price of the authentication information.
, Description:Technical Field of the Invention
The technical field of the application relates to methods and devices for blockchain-based data management.
Background of the Invention
In current technologies, on-line service suppliers or different holders of personal information could lack adequate protection mechanisms to safeguard such private data, that has diode to frequent information breaches. information storage at multiple locations could additional increase the possibility of knowledge breaches. as an example, hackers could hack into one or a lot of of such information storage places maintained by the web service suppliers and export user data for malicious uses. Further, in current solutions, on-line service suppliers typically implement their own storage and access rules and maintain sole management. information accesses are troublesome to trace and leave behind very little proof for security analysis or for users to say their rights. Thus, increased information security for privacy protection may be a difficult issue remaining to be resolved.
In addition, every user could need to register accounts for various on-line applications, despite that similar personal data is provided. the method is repetitive, tedious, and account and arcanum mixtures is also simply needed. Such a drawback to users seems to be a plus for hackers. Hackers could generate a library of dummy account and arcanum mixtures supported certain purloined account and password combinations for a definite on-line application and use the dummy combinations to log into different online applications by trial-and-error. Since users typically use common account and arcanum mixtures for various on-line applications, a sequence of knowledge breaches could unfold across completely different on-line applications. it's so fascinating to own a system that may firmly store non-public information.
Object of the Invention
The present object of the invention is getting authentication data of a login user.
Another object of the invention is generating a digital abstract of the authentication data of the login user
Further object of the invention is authenticating the login user supported a comparison between the digital abstract of the authentication data of the login user and one or a lot of digital abstracts keep on a blockchain.
Summary of the Invention
In some embodiments, the authentication data includes a minimum of one of: associate degree account identification related to the login user or a arcanum associated with the account identification.
In different embodiments, the digital abstract of the authentication data includes a hash price of the authentication information.
In still different embodiments, before getting the authentication data of the login user, the tactic additional comprises: getting authentication data of a user for registration; generating a digital abstract supported the authentication information of the user for registration; and transmittal the digital abstract generated based on the authentication information of the user for registration to at least one or more nodes of the blockchain for storage within the blockchain, whereby the transmitted digital abstract is one amongst the one or a lot of digital abstracts keep on the blockchain.
In however different embodiments, getting the authentication data of the user for registration comprises: receiving a registration request forwarded from a service system, whereby the registration request is requested by the user for registration; providing a direct address to the service system for the service system to render a registration page such as the redirect address; and aggregation the authentication data through the registration page from the user for registration.
In some embodiments, getting the authentication data of the user for registration additional includes obtaining permission from the user for registration to use the authentication information to certify the user for registration for one or more different service systems.
In different embodiments, getting authentication data of the user for registration includes obtaining authentication information and user detail information of the user for registration; and storing the user detail information in an exceedingly storage system.
In still different embodiments, the tactic additional comprises: getting missive of invitation to perform a group action from the login user; retrieving from the storage system user detail data of the login user for activity the transaction; and death penalty the transaction based mostly a minimum of on the user detail information of the login user.
In however different embodiments, once getting the request to perform the group action and before retrieving from the storage system the user detail data for activity the transaction, the tactic additional comprises: getting authentication of the login user supported another comparison between the digital abstract of the authentication data of the login user and therefore the one or more digital abstracts keep on the blockchain.
Brief description of Diagrams:
Fig. 1 illustrates a flow chart of associate degree example of a technique for blockchain-based information management, in accordance with numerous embodiments.
Detailed description of invention
Fig. 1 illustrates a flow chart of associate degree example of a technique for information management, in accordance with numerous embodiments. the tactic is also enforced by one or a lot of elements of the system or a node of the blockchain system of Fig.1 the tactic is also enforced by a system comprising numerous hardware machine and/or software system. as an example, the info management system is also enforced by one or a lot of systems or devices. The system implementing the tactic could comprise one or a lot of processors and one or more non-transitory computer-readable storage media coupled to the one or more processors and designed with directions viable by the one or more processors to cause the system to perform the tactic. The operations conferred below are supposed to be illustrative. looking on the implementation, the tactic could embrace further, fewer, or different steps performed in various orders or in parallel. associate degree example of an implementation of the tactic includes getting authentication data of a login user. In some embodiments, the authentication data includes associate degree account identification related to the login user and/or an arcanum associated with the account identification. as an example, associate degree account and an arcanum entered by a user for login or the account alone is also captured.
Includes generating a digital abstract of the authentication data of the login user. In some embodiments, the digital abstract of the authentication data includes a hash price of the authentication information. In some embodiments, the digital abstract of the authentication data of the login user is generated by constant science method as that for the digital abstracts keep on the blockchain. In some embodiments, the digital abstract of the authentication data includes a hash price of the authentication information.
It includes authenticating the login user supported a comparison between the digital abstract of the authentication data of the login user and one or a lot of digital abstracts keep on a blockchain.
In some embodiments, authenticating the login user supported the comparison between the digital abstract of the authentication data of the login user and one or a lot of digital abstracts keep on a blockchain comprises scrutiny the digital abstract of the authentication information of the login user with the one or more digital abstracts stored on the blockchain; and authenticating the login user in response to the digital abstract of the authentication information being constant joined of the digital abstracts stored on the blockchain.
In different embodiments, authenticating the login user supported the comparison between the digital abstract of the authentication data of the login user and one or a lot of digital abstracts keep on a blockchain comprises getting a results of the comparison from the one or more nodes of the blockchain, the comparison performed by the one or a lot of nodes of the blockchain; and authenticating the login user in response to the digital abstract of the authentication data being constant joined of the digital abstracts keep on the blockchain per the obtained result. That is, the authentication of the login user is also performed by one or a lot of nodes of the blockchain system. as an example, management system could instruct the one or a lot of nodes of the blockchain to match the digital abstract of the authentication information of the login user and one or more digital abstracts keep on the blockchain through a question. The question could yield a result of whether or not the digital abstract of the authentication data of the login user matches with any of the digital abstracts keep on the blockchain.
Whether the authentication of the login user is performed by the one or a lot of elements of the system or by the one or more nodes of the blockchain system, a result that the login user exists within the system is also obtained if the digital abstract of the authentication data matches any of the blockchain-stored digital abstracts, and a result that the login user doesn't exist within the system is also obtained if the digital abstract of the authentication data matches none of the blockchain-stored digital abstracts.
In still different embodiments, every of the one or a lot of digital abstracts keep on the blockchain incorporates a group action identification related to storing the corresponding digital abstract to the blockchain and therefore the technique additional comprises: in response to with success authenticating the login user, getting a group action identification related to storing one amongst digital abstracts keep on the blockchain that matches the digital abstract of the authentication data. additional details will be stated step represented higher than. supported the group action identification, the keep digital abstracts will be retrieved.
In some embodiments, before getting the authentication data of the login user, the tactic additional comprises: getting authentication data of a user for registration; generating a digital abstract supported the authentication information of the user for registration; and transmittal the digital abstract generated based on the authentication information of the user for registration to at least one or more nodes of the blockchain for storage within the blockchain, whereby the transmitted digital abstract is one amongst the one or a lot of digital abstracts keep on the blockchain. The user for registration could seek advice from a user registering with a service system. By these steps, numerous users could register their authentication data of the accounts, the digital abstracts of which can be firmly keep to the blockchain and recoverable for future authentication.
In some embodiments, getting the authentication data of the user for registration comprises: receiving a registration request forwarded from a service system, whereby the registration request is requested by the user for registration; providing a direct address (e.g., URL) to the service system for the service system to render a registration page such as the direct address; and aggregation the authentication data through the registration page from the user for registration. Thus, the authentication data of assorted users trying to register at various services systems will be collected by a centralized system the storage system, rising the safety for the info storage and unburdening the service systems from aggregation and safe-keeping data. In one embodiment, getting the authentication data of the user for registration additional comprises: obtaining permission from the user for registration to use the authentication information to certify the user for registration for one or more different service systems. Thus, the user doesn't need to repeat the registration at multiple service systems.
In different embodiments, getting authentication data of the user for registration includes obtaining authentication information and user detail information of the user for registration; and storing the user detail information in an exceedingly storage system. as an example, the user detail data could embrace contact information, address data, identification data, etc. The user detail data is also utilized in activity numerous transactions or different operations offered by the service systems. In one embodiment, the tactic additional comprises: getting missive of invitation to perform a group action from the login user; retrieving from the storage system user detail data of the login user for activity the transaction, and death penalty the group action based mostly a minimum of on the user detail data of the login user. once getting the request to perform the group action and before retrieving from the storage system the user detail data for activity the transaction, the tactic additional comprises: getting authentication of the login user supported another comparison between the digital abstract of the authentication data of the login user and therefore the one or more digital abstracts keep on the blockchain. additional details will be stated the steps represented higher than. as an example, a user could log into associate degree account by getting into authentication data at a service system like an internet looking website. once browsing, the user could attempt to purchase bound merchandise and thereby initiate a group action. The service system could optionally prompt the user to move into the authentication data. Then, the service system could retrieve user detail data like shipping address, contact range, and payment data for activity the group action.
In some embodiments, transmittal the digital abstract generated supported the authentication data of the user for registration to the one or a lot of nodes of the blockchain for storage within the blockchain comprises writing the digital abstract

Documents

Application Documents

# Name Date
1 201921050587-STATEMENT OF UNDERTAKING (FORM 3) [07-12-2019(online)].pdf 2019-12-07
2 201921050587-POWER OF AUTHORITY [07-12-2019(online)].pdf 2019-12-07
3 201921050587-FORM FOR STARTUP [07-12-2019(online)].pdf 2019-12-07
4 201921050587-FORM FOR SMALL ENTITY(FORM-28) [07-12-2019(online)].pdf 2019-12-07
5 201921050587-FORM 1 [07-12-2019(online)].pdf 2019-12-07
6 201921050587-FIGURE OF ABSTRACT [07-12-2019(online)].jpg 2019-12-07
7 201921050587-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [07-12-2019(online)].pdf 2019-12-07
8 201921050587-EVIDENCE FOR REGISTRATION UNDER SSI [07-12-2019(online)].pdf 2019-12-07
9 201921050587-DRAWINGS [07-12-2019(online)].pdf 2019-12-07
10 201921050587-COMPLETE SPECIFICATION [07-12-2019(online)].pdf 2019-12-07
11 Abstract1.jpg 2019-12-12
12 201921050587-ORIGINAL UR 6(1A) FORM 26-131219.pdf 2019-12-16
13 201921050587-Proof of Right [30-11-2020(online)].pdf 2020-11-30