Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases
First Claim
1. We claim a method for exchange of pseudonymous personal information between or within at least one data storage servers in which the identities of the associated individuals (Person or Organization), associated servers and/or associated organizations with which the said Private Data resides is pseudonymous. We claim a method for exchange of pseudonymous Private Data between a User and one or more data storage servers in a Closed System (e.g. where user access is restricted at the database level) in which the identities of the associated individuals (Person or Organization), associated servers and/or associated organizations with which the said Private Data resides is pseudonymous. We claim a method for exchange of pseudonymous Private Data between a User and one or more data storage servers in an Open System (e.g. involving two or more databases or data sources, such as email, fax, telephone, etc.) in which the identities of the associated individuals (Person or Organization), associated servers and/or associated organizations with which the said Private Data resides is pseudonymous. We claim a method for exchange of Private Data between or within at least one data storage servers in which the identities of the associated individuals (Person or Org), associated servers and/or associated organizations with which the said Private Data resides may be pseudonymous or actual based on the User'"'"'s Access Control Rules.
0 Assignments
0 Petitions
Accused Products
Abstract
A system is provided that preserves data privacy for the Individual—I and Private Data Owner (PDO) while granting data access to the User-U and Accessor who need such data to perform their usual and customary business functions. The method and system completely control the User'"'"'s access to the Private Data Owner'"'"'s Private Data by replacing Identifying Information for the User—U, Individual—I, Accessor and PDO with pseudonyms. This assures the overall privacy of individuals, throughout the course of collecting, storing, accessing, analyzing and sharing detailed private records among different organizations engaged in providing and/or consuming services and/or products. Access Control Rule Sets (“ACRS”) consist of instructions which prescribe the terms and conditions for permitting Users to access the PDO'"'"'s Pseudonymized and Actual Private data in accordance with the rules governing their authorization to access such data.
167 Citations
1 Claim
-
1. We claim a method for exchange of pseudonymous personal information between or within at least one data storage servers in which the identities of the associated individuals (Person or Organization), associated servers and/or associated organizations with which the said Private Data resides is pseudonymous.
We claim a method for exchange of pseudonymous Private Data between a User and one or more data storage servers in a Closed System (e.g. where user access is restricted at the database level) in which the identities of the associated individuals (Person or Organization), associated servers and/or associated organizations with which the said Private Data resides is pseudonymous. We claim a method for exchange of pseudonymous Private Data between a User and one or more data storage servers in an Open System (e.g. involving two or more databases or data sources, such as email, fax, telephone, etc.) in which the identities of the associated individuals (Person or Organization), associated servers and/or associated organizations with which the said Private Data resides is pseudonymous. We claim a method for exchange of Private Data between or within at least one data storage servers in which the identities of the associated individuals (Person or Org), associated servers and/or associated organizations with which the said Private Data resides may be pseudonymous or actual based on the User'"'"'s Access Control Rules.
Specification