Abstract: There is provided a computer-implemented method for managing third-party access to data, to increase data security and/or privacy. The method comprises receiving, from a third-party computer, a request to access data, wherein the request is indicative of at least one requested operation. A validity of each of the requested operations is determined in dependence on permission data stored in a distributed public ledger. The permissions data defines, for said third-party computer, a set of permissible operations and one or more permissible data attributes associated with each of the set of permissible operations. The request and the validity are logged in the distributed public ledger.
Abstract: There is provided a computer-implemented method of enhancing data privacy. One or more tensors of numeric data are determined, at a processor, in dependence on input data. A transform is determined in dependence on user-associated data, which may be user input or biometric data. Each of the one or more tensors of numeric data are transformed into at least two fragments of data by applying the transform. Each of the fragments of data obfuscates the numeric data. Each of the at least two fragments of data are stored separately at a respective geographically separated storage system.