System and method for dual key card dual database access control and identification
First Claim
1. A flexible dual key dual database access control and identification system for electronic transactions, the system maintaining select key holder information anonymously in a database, the system comprising:
- (a) an access card containing a first and a second authentication key, the first and second authentication keys being mathematically unrelated to each other;
(b) a reader capable of interacting with the access card and reading the first and second authentication keys from the access card;
(c) a first database associated with the first authentication key, the first database containing private records of a subscriber;
(d) a second database associated with the second authentication key, the second database containing public records of the subscriber, the first database records and second database records being mutually exclusive and distinct;
(e) a processor for interacting with the first database and second database, the processor being operatively connected to the reader; and
(f) a network operatively connecting the processor and the first and second databases.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for dual key dual database access control and identification system (Dual Key System) and method to maintain security, organization and privacy during electronic transactions. A dual key access card system maintains two separate and distinct database (201, 202), a public file database (202) and a private file database (201), for a given access cardholder. Each access cardholder has a record in each maintained database (201, 202); however, the records can only be integrated through the use of two record identifiers stored on the holder'"'"'s access card (100). The dual database system allows the data maintained in each database to be kept relatively small, and allows for the anonymous public data to be processed more efficiently without knowing the identity of the person whose information is being maintained. As a result, an affinity-modeling engine can constantly run against the anonymous data while maintaining cardholder security and anonymity.
-
Citations
12 Claims
-
1. A flexible dual key dual database access control and identification system for electronic transactions, the system maintaining select key holder information anonymously in a database, the system comprising:
-
(a) an access card containing a first and a second authentication key, the first and second authentication keys being mathematically unrelated to each other;
(b) a reader capable of interacting with the access card and reading the first and second authentication keys from the access card;
(c) a first database associated with the first authentication key, the first database containing private records of a subscriber;
(d) a second database associated with the second authentication key, the second database containing public records of the subscriber, the first database records and second database records being mutually exclusive and distinct;
(e) a processor for interacting with the first database and second database, the processor being operatively connected to the reader; and
(f) a network operatively connecting the processor and the first and second databases. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for providing secure access and privacy during electronic transactions using a dual database dual key system, the method comprising the steps of:
-
(a) reading a first and a second authentication key from an access card, the first and second authentication keys being mathematically unrelated to each other;
(b) accessing a subscriber'"'"'s private records from a first database using the first authentication key;
(c) accessing the subscriber'"'"'s public records from a second database using the second authentication key the private records and public records being mutually exclusive and distinct; and
(d) integrating the private records and the public records.
-
-
10. A method for providing privacy during electronic transactions using a dual database dual key system, the method comprising the steps of:
-
(a) monitoring a subscriber'"'"'s electronic transaction;
(b) recording private information associated with the electronic transaction in a first database, the first database being associated with a first authentication key; and
(c) recording public information associated with the electronic transaction in a second database, the second database being associated with a second authentication key, the first and second authentication keys being mathematically unrelated and being stored on an access card.
-
-
11. A method for providing preferences to a subscriber for delivery of media content, the method comprising the steps of:
-
(a) performing affinity modeling on records in a first database associated with the subscriber, the first database being related with a first authentication key;
(b) determining the preferences for the subscriber based on the affinity modeling;
(c) reading the first and a second authentication key from an access card, the first and second authentication keys being mathematically unrelated to each other;
(d) accessing records from a second database associated with the subscriber using the second authentication key, the second authentication key being related to the second database; and
(e) providing the preferences for the delivery of media content to the subscriber. - View Dependent Claims (12)
-
Specification