Accessing personal information
First Claim
Patent Images
1. A method of authorizing access to personal data, comprising:
- obtaining, by a first person, via a software application, access to personal information attributed to the first person;
providing, to the software application, the identity of a second person, the identity of the second person being previously unknown to the software application; and
providing, to the software application, a relationship between the first person and the second person.
3 Assignments
0 Petitions
Accused Products
Abstract
Dependents of benefit plan participants can be given access to personal information of a plan participant. The dependents, who are not existing users or members of the plan, can be allowed access to some or all of the personal information associated with the plan participant.
80 Citations
67 Claims
-
1. A method of authorizing access to personal data, comprising:
-
obtaining, by a first person, via a software application, access to personal information attributed to the first person;
providing, to the software application, the identity of a second person, the identity of the second person being previously unknown to the software application; and
providing, to the software application, a relationship between the first person and the second person. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method of allowing access to personal information, comprising:
-
allowing, via software application, a first person to access personal information attributed to the first person;
receiving, from the first person, via the software application, the identity of a second person, the identity of the second person being previously unknown to the software application; and
receiving, from the first person, via the software application, parameters defining the relationship between the first person and the second person. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
-
50. A computerized system for allowing access to personal information, the system comprising:
-
one or more data storage modules for storing personal information attributed to a first person that is a user of a software application;
a communication module in electronic communication with the data storage modules for receiving electronic communications from the first person, the communications comprising instructions to grant a second person access to the subset of the personal information attributed to the first person, wherein the identity of the second person is previously unknown to the software application. a security module in electronic communication with the data storage modules and the communication module for determining a subset of the personal information attributed to the first person that can be accessed by the second person. - View Dependent Claims (51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62)
-
-
63. A computerized system for allowing access to personal data, the system comprising:
-
means for providing access to a set of data to a first person, the set of data comprising personal information attributed to the first person;
means for receiving from the first person, the identity of a second person, wherein the identity of the second person had not been previously provided to the software application; and
means for receiving, from the first person, a relationship between the first person and the second person. - View Dependent Claims (64, 65, 66, 67)
-
Specification