Systems and methods for configuring digital storage media with multiple access privileges
First Claim
1. A method for controlling access by a plurality of people to information pertaining to at least one person, comprising:
- securing data of a first encryption type so that it is accessible by at least a first person;
securing data of a second encryption type so that it is accessible by at least a second person so that the first person'"'"'s access to the data of the second encryption type is restricted and so that at least a third person'"'"'s access to the data of the first encryption type and the data of the second encryption type is restricted.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a system for accurately storing and reading digital identifications and permissions with an access rights management component that protects the privacy and integrity of the data stored. Aspects of the invention enable effective use of smart cards for applications such as air travelers identity, medical information such as history and prescriptions, or secure employee access cards. Multiple levels of security are permitted to ensure that users of the data, programs, and other resources stored on the card may access only that data that they have been authorized to. The use of a single card for multiple user roles may be used in conjunction with multiple access methods.
-
Citations
32 Claims
-
1. A method for controlling access by a plurality of people to information pertaining to at least one person, comprising:
-
securing data of a first encryption type so that it is accessible by at least a first person;
securing data of a second encryption type so that it is accessible by at least a second person so that the first person'"'"'s access to the data of the second encryption type is restricted and so that at least a third person'"'"'s access to the data of the first encryption type and the data of the second encryption type is restricted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A portable data storage medium, comprising:
-
data of a first encryption type accessible by at least a first person;
data of a second encryption type accessible by at least a second person so that the first person'"'"'s access to the data of the second encryption type is restricted and so that at least a third person'"'"'s access to the data of the first encryption type and the data of the second encryption type is restricted. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for generating a data structure, said data structure comprising a plurality of data resources accessible by a plurality of persons, said method comprising:
-
associating a first data resource with a first restriction level, wherein read access to said first data resource is unrestricted, and wherein update access to said first data resource is restricted to a predefined group of people comprising at least a first person and an administrative person;
associating a second data resource with a second restriction level, wherein read access to said second data resource is restricted to a predefined group of people comprising at least the first person and the administrative person;
associating a third data resource with a third restriction level, wherein update access to said third data resource is restricted to a predefined group of people comprising at least the administrative person. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A method for controlling access to a plurality of data resources associated with at least one person, comprising:
-
permitting unrestricted read-only access by the general public to a first data resource;
restricting read access to a second data resource such that the general public cannot read said second data resource while the at least one person and at least one administrative person are permitted to read said second data resource;
restricting update access to a third data resource such that the at least one person cannot update said third data resource while the at least one administrative person is permitted to update third data resource. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32)
-
Specification