System for managing transactional data
First Claim
1. A system, comprising:
- a plurality of transaction storage devices, each transaction storage device of the plurality of transaction storage devices comprising a data store configured to;
receive, from a first entity, a request to push a detailed transaction corresponding to a secure identifier,wherein the secure identifier is generated, using an encoding function, from a user identifier of a user,wherein the detailed transaction identifies at least one selected from a group consisting of products and services received by the user from the first entity;
validate the detailed transaction using metadata from the first entity; and
store the detailed transaction based on a first determination to trust the first entity after validating the detailed transaction;
an access controller configured to;
perform the first determination by applying a first security rule corresponding to a type of the secure identifier to the request to push the detailed transaction; and
determine, based on the first security rule indicating that an identity check should be performed, whether the number of entries corresponding to the first entity in a greylist exceeds a threshold; and
a registry configured to store at least the first security rule.
1 Assignment
0 Petitions
Accused Products
Abstract
A system may include transaction storage devices. Each transaction storage device may include a data store configured to receive, from a first entity, a request to push a detailed transaction corresponding to a secure identifier. The secure identifier may be generated, using an encoding function, from a user identifier of a user. The data store may be further configured to store the detailed transaction based on a first determination to trust the first entity. The system may further include an access controller configured to perform the first determination by applying a first security rule corresponding to a type of the secure identifier to the request to push the detailed transaction, and a registry configured to store at least the first security rule.
20 Citations
13 Claims
-
1. A system, comprising:
-
a plurality of transaction storage devices, each transaction storage device of the plurality of transaction storage devices comprising a data store configured to; receive, from a first entity, a request to push a detailed transaction corresponding to a secure identifier, wherein the secure identifier is generated, using an encoding function, from a user identifier of a user, wherein the detailed transaction identifies at least one selected from a group consisting of products and services received by the user from the first entity; validate the detailed transaction using metadata from the first entity; and store the detailed transaction based on a first determination to trust the first entity after validating the detailed transaction; an access controller configured to; perform the first determination by applying a first security rule corresponding to a type of the secure identifier to the request to push the detailed transaction; and determine, based on the first security rule indicating that an identity check should be performed, whether the number of entries corresponding to the first entity in a greylist exceeds a threshold; and a registry configured to store at least the first security rule. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
receiving, from a first entity, a request to push a detailed transaction corresponding to a secure identifier, wherein the secure identifier is generated, using an encoding function, from a user identifier of a user, wherein the detailed transaction identifies at least one selected from a group consisting of products and services received by the user from the first entity; validate the detailed transaction using metadata from the first entity; storing the detailed transaction based on a first determination to trust the first entity after validating the detailed transaction, wherein the first determination comprises applying a first security rule corresponding to a type of the secure identifier to the request to push the detailed transaction; and determining, based on the first security rule indicating that an identity check should be performed, whether the number of entries corresponding to the first entity in a greylist exceeds a threshold. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification