Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure digital information infrastructure

a digital information infrastructure and secure technology, applied in the field of network and data security, can solve the problems of increasing the chance of hacker intrusion, necessitating disadvantageously large amounts of repetitive hardware and software,

Active Publication Date: 2021-04-15
OASIS MEDICAL
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The system decreases the likelihood of hacker intrusions and minimizes redundant hardware and software requirements by centralizing content storage and access, while ensuring secure and efficient content distribution to authorized users.

Problems solved by technology

Such implementations increase the chance of hacker intrusions, while also necessitating disadvantageously large amounts of repetitive hardware and software.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure digital information infrastructure
  • Secure digital information infrastructure
  • Secure digital information infrastructure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019]Described herein is a secure digital information infrastructure. An aspect of the disclosure relates to the utilization of a secure digital information infrastructure.

[0020]As will be described in greater detail herein, an aspect of the disclosure relates to a distributed cloud-based computing system comprising a plurality of cloud servers is configured to securely store and distribute respective custom content associated with corresponding respective different entities. In addition, the cloud-based computing system may store content that is common to the different entities. The cloud-based computing system may provide authentication and encryption services.

[0021]Thus, rather than each entity having to receive, process, and secure data, and store repetitive content, a common system may be utilized to store and render entity-specified content in conjunction with content common to multiple entities, and to ensure the provision of entity-specified content is provided only to thos...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication and encryption computer system is disclosed including processing devices, a network interface, and a data store. The authentication and encryption system is configured to maintain in the data store content common to a plurality of entities and content independently specified by each of the plurality of entities. The system is configured to receive a content request from an application executing on a mobile device, the content request comprising a secure access code corresponding to an entity, and the content request encrypted by the mobile device. An interface, comprising the content common to the plurality of entities, is customized to include content independently specified by the entity, wherein the content independently specified by the entity comprises a token value. A user request for an item presented via the interface is received and the token value is transferred to the entity.

Description

INCORPORATION BY REFERENCE TO ANY PRIORITY APPLICATIONS[0001]Any and all applications for which a foreign or domestic priority claim is identified in the Application Data Sheet as filed with the present application are hereby incorporated by reference under 37 CFR 1.57.COPYRIGHT NOTICE[0002]A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document and / or the patent disclosure as it appears in the United States Patent and Trademark Office patent file and / or records, but otherwise reserves all copyrights whatsoever.BACKGROUNDField of the Invention[0003]The present disclosure relates to network and data security.Description of the Related Art[0004]Conventionally, websites that receive, process, and secure data each need to have their own security infrastructure, their own webpage content, and their own data processing processes. Such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3226H04L9/3213H04L9/0863H04L9/0894H04L63/0428H04L63/08G06Q20/12G06F16/958G06F16/9535G06F21/31G06F21/10G06Q30/0641G06Q30/01G06Q30/0226G06Q10/08G06Q30/0613G06Q30/018G06Q50/04G06Q50/22G06Q2220/00
Inventor DELGADO, NORMAN CRAIG
Owner OASIS MEDICAL