US 12,476,820 B2
Using a tree structure to segment and distribute records across one or more decentralized, acyclic graphs of cryptographic hash pointers
Christopher Edward Struttmann, Indialantic, FL (US); and James Douglas Beecham, Austin, TX (US)
Assigned to ALTR Solutions, Inc., Austin, TX (US)
Filed by ALTR Solutions, Inc., Austin, TX (US)
Filed on May 1, 2025, as Appl. No. 19/196,463.
Application 19/196,463 is a continuation of application No. 18/180,078, filed on Mar. 7, 2023, granted, now 12,301,724.
Application 18/180,078 is a continuation of application No. 17/584,088, filed on Jan. 25, 2022, granted, now 11,637,706, issued on Apr. 23, 2023.
Application 17/584,088 is a continuation of application No. 17/143,009, filed on Jan. 6, 2021, granted, now 11,265,171, issued on Mar. 1, 2022.
Application 17/143,009 is a continuation of application No. 16/669,337, filed on Oct. 30, 2019, granted, now 10,911,241, issued on Feb. 2, 2021.
Application 16/669,337 is a continuation of application No. 16/211,057, filed on Dec. 5, 2018, granted, now 10,505,740, issued on Dec. 10, 2019.
Application 16/211,057 is a continuation of application No. 15/917,616, filed on Mar. 10, 2018, granted, now 10,193,696, issued on Jan. 29, 2019.
Application 15/917,616 is a continuation in part of application No. 15/675,519, filed on Aug. 11, 2017, granted, now 10,121,019, issued on Nov. 6, 2018.
Application 15/675,519 is a continuation in part of application No. 15/171,347, filed on Jun. 2, 2016, granted, now 10,581,977, issued on Mar. 3, 2020.
Claims priority of provisional application 62/469,742, filed on Mar. 10, 2017.
Claims priority of provisional application 62/374,307, filed on Aug. 12, 2016.
Claims priority of provisional application 62/169,823, filed on Jun. 2, 2015.
Prior Publication US 2025/0260581 A1, Aug. 14, 2025
Int. Cl. H04L 29/06 (2006.01); G06F 16/901 (2019.01); G06F 21/60 (2013.01); G06F 21/64 (2013.01); G06F 21/78 (2013.01); H04L 9/06 (2006.01); H04L 9/32 (2006.01); H04L 9/00 (2022.01)
CPC H04L 9/3242 (2013.01) [G06F 16/9024 (2019.01); G06F 21/602 (2013.01); G06F 21/64 (2013.01); G06F 21/78 (2013.01); H04L 9/0637 (2013.01); H04L 9/3239 (2013.01); H04L 9/50 (2022.05)] 54 Claims
OG exemplary drawing
 
1. A tangible, non-transitory, machine-readable medium storing instructions that when executed by one or more processors effectuate operations comprising:
receiving, with a computer system, a request to read data stored in a database, the request being received from a computing entity and comprising a user identifier;
accessing, with the computer system, one or more log entries associated with prior read requests associated with the user identifier;
determining, with the computer system, that at least some of the data to be returned in response to the request is to be obfuscated based on an access policy applicable to a user having the user identifier, the access policy comprising one or more access control rules that define conditions for access to values stored in respective fields of the database;
in response to the determination, causing, with the computer system, a response to the request to comprise data from the database with one or more values in the response obfuscated in accordance with the access control rules;
monitoring, with the computer system, a number of read requests associated with the user identifier, each read request having an associated time duration; and
determining, with the computer system, that the number of read requests having time durations that exceed a duration threshold satisfies a count threshold.