Microsoft Corporation
Accessibility controls in distributed data systems

Last updated:

Abstract:

Methods, systems, apparatuses, and computer program products are provided for controlling data access and/or accessing data in a distributed network. An identifier may be generated for confidential data. A hash generator may generate a first hash of the confidential data, and generate a second hash based on the first hash and the identifier. A data packet set that includes the confidential data, the identifier, and the second hash may be encrypted and transmitted between nodes of the distributed network. A receiving node may decrypt the packet set using one or more appropriate encryption keys and regenerate the second hash from the confidential data and the identifier. The regenerated hash may be compared against the decrypted hash to authenticate the received confidential data and/or validated against a revocable hash stored in an array of the owning node that is accessible by any receiving node.

Status:
Grant
Type:

Utility

Filling date:

25 Apr 2019

Issue date:

21 Sep 2021