Method and system for person data authentication and management
First Claim
1. A computer-implemented system for virtually linking a plurality of unrelated database systems, authenticating core person data input into said plurality of unrelated database systems, and managing through business rules said core person data, the system comprising:
- a person data repository for storing the core person data for all persons requiring visibility in any one of said plurality of unrelated database systems wherein said core person data comprises a person name and birth date identifier;
a controller module connected to said person data repository and arranged to apply a set of business rules for restricting access, input, and modification of said core person data by said plurality of unrelated database systems;
an access control module connected between a user interface of any one of said plurality of unrelated database systems and said controller module wherein said access control module monitors said user interface for input, querying or modification of said core person data and imposes said business rules when an attempt is made to input, query or modify said core person data; and
an authentication module connected to said controller module for authenticating as unique the addition of a person to said core person data by the person name and birth date identifier;
whereby said core person data is authenticated and maintained for said plurality of unrelated database systems as a virtual relational database of the core person data.
20 Assignments
0 Petitions
Accused Products
Abstract
A person authentication system for authenticating core person data to a plurality of unrelated database systems and virtually linking the plurality of unrelated database systems thus creating a person data repository is provided. A controller module is connected to the person data repository for applying business rules to the input and modification of the core person data. An access control module connected between a user interface of any one of the plurality of unrelated databases systems and the controller module monitors for the input, query or modification of core person data and imposes the business rules on any input, query or modification of the core person data. An authentication module connected to the controller module authenticates as unique the addition of a person to the person data repository.
-
Citations
10 Claims
-
1. A computer-implemented system for virtually linking a plurality of unrelated database systems, authenticating core person data input into said plurality of unrelated database systems, and managing through business rules said core person data, the system comprising:
-
a person data repository for storing the core person data for all persons requiring visibility in any one of said plurality of unrelated database systems wherein said core person data comprises a person name and birth date identifier;
a controller module connected to said person data repository and arranged to apply a set of business rules for restricting access, input, and modification of said core person data by said plurality of unrelated database systems;
an access control module connected between a user interface of any one of said plurality of unrelated database systems and said controller module wherein said access control module monitors said user interface for input, querying or modification of said core person data and imposes said business rules when an attempt is made to input, query or modify said core person data; and
an authentication module connected to said controller module for authenticating as unique the addition of a person to said core person data by the person name and birth date identifier;
whereby said core person data is authenticated and maintained for said plurality of unrelated database systems as a virtual relational database of the core person data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for authenticating person data to a plurality of unrelated database systems comprising a plurality of databases, the method comprising:
-
providing a person data repository comprising the person data wherein the person data repository is comprised of a subset of the plurality of databases;
providing a controller module for monitoring a user interface of the plurality of unrelated database systems for a request to input new person data into any one the plurality of unrelated database systems;
providing an access control module comprising business rules for receiving a request to input the new person data from the controller module; and
applying the business rules of the access control module to restrict the input of the new person data into the plurality of databases if the new person data matches the person data existing in the plurality of databases;
whereby the person data is authenticated to the plurality of unrelated database systems.
-
Specification