Search All Applications in Cryptocurrency: Security
Application US20190050855
Published 2019-02-14
Blockchain-based Systems, Methods, And Apparatus For Securing Access To Information Stores
Systems, apparatus, methods, and articles of manufacture are described herein for allowing secured access as a service to information in a distributed ledger system (e.g., a blockchain).
Much More than Average Length Specification
View the Patent Matrix® Diagram to Explore the Claim Relationships
USPTO Full Text Publication >
- 1. A system for controlling access to information stored in a distributed ledger environment, the system comprising:
a processing device; and a memory device in communication with the processor, the memory device storing operating instructions and programmatic code defining a blockchain application operable to manage a distributed ledger, wherein executing of the operating instructions by the processing device results in: receiving a first smart contract comprising a first data table, a first keyset, and a first code module,
wherein successful execution of the first code module is required for access to the first data table;
executing the first smart contract; determining whether the first smart contract executed successfully; and performing one of:
permitting access to the first data table if the first smart contract executed successfully, or
denying access to the first data table if the first smart contract did not execute successfully.
- 16. A method for controlling access to information stored in a distributed ledger environment, comprising:
receiving a first smart contract comprising a first data table, a first keyset, and a first code module,
wherein the first code module defines a call to a second smart contract, the second smart contract comprising a second data table, a second keyset, and a second code module,
wherein successful execution of the first code module is required for access to the first data table, and
wherein successful execution of the second code module is required for access to the second data table;
executing the first smart contract; determining whether the first smart contract executed successfully; and performing one of:
permitting access to the first data table if the first smart contract executed successfully, or
denying access to the first data table if the first smart contract did not execute successfully.