Patents by Inventor Zachary S. ANKROM

Zachary S. ANKROM has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240380433
    Abstract: Embodiments permit secure information exchange using lightweight data and near-field communication (NFC). A user can transmit lightweight data, such as one or more indicators (e.g., user indicator, scope indicator(s), documents indicator(s), etc.), to a receiving computing system via the user's wireless device and an NFC protocol. Because NFC transmissions are performed by co-located devices, this lightweight data transmission can trigger and/or continue a sophisticated workflow. For example, the receiving computing system can be associated with a product or service provider, and the lightweight data transmission can progress a workflow related to a particular product and/or service. The workflow progression can include accessing secure user information via the indicator(s) received over the NFC transmission.
    Type: Application
    Filed: July 21, 2023
    Publication date: November 14, 2024
    Applicant: Oracle International Corporation
    Inventors: Zachary S. ANKROM, Jan BAJEC, David Allan James DREWETTE
  • Publication number: 20240330508
    Abstract: Embodiments permit scope limited access to a user's secure information using blockchain backed credential(s). A user can register with a secure information manager and control the scope with which the user's secure information is shared. For example, the user can permit a vetted entity access to the user's secure information via a portable access point. The user can select scope definition that control how the user's secure information is shared. The vetted entity can scan the user's portable access point and request a credential. The vetted entity can then issue data access request(s) using the credential. The secure information manager can permit the vetted entity scope limited access to the user's secure information that corresponds to the access privileges assigned to the credential. The secure user information managed by the secure information manager can be received or retrieved from multiple sources and ingested/organized according to a multidimensional data schema.
    Type: Application
    Filed: March 29, 2024
    Publication date: October 3, 2024
    Applicant: Oracle International Corporation
    Inventors: Zachary S. ANKROM, Kamran KHALIQ
  • Publication number: 20240126922
    Abstract: Embodiments permit scope limited access to a user's secure information using credential authentication and user information verification. Certain information sharing protocols can require an explicit grant to share a user's secure information with a requesting entity. In some scenarios such an explicit grant may be impractical, such as when the user is not available to provide such an explicit grant. Embodiments of a secure information manager can permit a vetted entity scope and time limited access to a user's secure information in such scenarios, for example when the vetted entity provides an assertion that the user is unable to provide an explicit grant. For example, in scenario(s) with exigent circumstances, the secure information manager can permit the vetted entity to access a limited scope of user information that corresponds to the vetted entity's relationship to the user, role in a workflow, or other suitable characteristics of the vetted entity.
    Type: Application
    Filed: October 18, 2023
    Publication date: April 18, 2024
    Inventors: Zachary S. ANKROM, Kamran KHALIQ
  • Publication number: 20240126919
    Abstract: Embodiments permit scope limited access to a user's secure information using non-fungible tokens (NFTs). A user can register with a secure information manager and control the scope with which the user's secure information is shared. For example, the user can permit a vetted entity access to the user's secure information via a portable access point. The user can select scope definition that control how the user's secure information is shared with the vetted entity. The vetted entity can scan the user's portable access point and request a credential. The credential can be a NFT that is assigned access privileges that correspond the user's selections. The vetted entity can then issue data access request(s) using the credential. The secure information manager can permit the vetted entity scope limited access to the user's secure information that corresponds to the access privileges assigned to the NFT.
    Type: Application
    Filed: March 13, 2023
    Publication date: April 18, 2024
    Inventors: Zachary S. ANKROM, Kamran KHALIQ
  • Publication number: 20240129313
    Abstract: Embodiments permit scope limited access to a user's secure information using blockchain backed credential(s). A user can register with a secure information manager and control the scope with which the user's secure information is shared. For example, the user can permit a vetted entity access to the user's secure information via a portable access point. The user can select scope definition that control how the user's secure information is shared with the vetted entity. The vetted entity can scan the user's portable access point and request a credential. The credential can be a blockchain backed credential that is assigned access privileges that correspond the user's selections. The vetted entity can then issue data access request(s) using the credential. The secure information manager can permit the vetted entity scope limited access to the user's secure information that corresponds to the access privileges assigned to the credential.
    Type: Application
    Filed: October 18, 2023
    Publication date: April 18, 2024
    Inventors: Zachary S. ANKROM, Kamran KHALIQ