| CPC G06F 21/6209 (2013.01) [G06F 21/6245 (2013.01); G06Q 20/36 (2013.01); G16H 10/60 (2018.01); H04L 9/0643 (2013.01); H04L 9/30 (2013.01); H04L 9/50 (2022.05); H04L 63/0407 (2013.01); H04L 63/0428 (2013.01)] | 20 Claims |

|
1. A method for controlling sharing of user data, comprising:
generating, by one or more processors, a public key-private key pair corresponding to a user;
obtaining, by the one or more processors, information associated with the user from a user device, or a third-party device, or both;
encrypting, by the one or more processors, the information associated with the user using the public key-private key pair corresponding to the user to produce encrypted data;
storing, by the one or more processors, the encrypted data to a distributed ledger;
configuring, by the one or more processors, a set of permissions configured to control sharing of the encrypted data based on inputs provided by the user via the user device; and
sharing, by the one or more processors, first information with a third party system based on the set of permissions, wherein the set of permissions comprise at least one permission configured to initiate an action with respect to the third party system based on the first information, and wherein the first information comprises a portion of the encrypted data, or information derived from at least the portion of the encrypted data, or both.
|