Intel Corporation
METHODS AND APPARATUS TO CONTROL ACCESS TO USER DATA BASED ON USER-SPECIFIED ATTRIBUTES
Last updated:
Abstract:
Methods, apparatus, systems, and articles of manufacture for controlling access to user data are disclosed herein. One such apparatus to control access to user data includes memory, instructions, and at least one processor to execute the instructions to attempt to verify an identity bid associated with a request for access to user data to be processed. The identity bid includes a cryptographic signature based on a secret embedded in a data compute agent that generated the identity bid. The processor is also to determine whether agent attributes included in the identity bid satisfy user data attributes associated with the user data, and to permit the data compute agent to access the user data when the identity bid is verified, and when the agent attributes satisfy the user data attributes.
Utility
24 Dec 2021
21 Apr 2022