Privacy management method and apparatus
First Claim
1. A computer implemented method for managing privacy information, comprising:
- receiving a request from a requestor for the privacy information of an entity as a result of a submission by an applicant;
creating a privacy transaction in a database for the privacy information including one or more identity qualities from the applicant and one or more characteristics for the submission; and
scoring the privacy transaction according to the one or more identity qualities from the applicant and the one or more characteristics for the submission to provide a confidence level indicative of the authenticity and authorization of the submission.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer implemented method describes managing privacy information. Initially, a request is received from a requester for the privacy information of an entity. The request is often the result of an applicant submitting a form or application to the requester. Next, implementations of the present invention create a privacy transaction in a database for the privacy information including one or more identity qualities from the applicant and one or more characteristics for the submission. These identity qualities, characteristics for the submission and other pieces of information are used to score the privacy transaction according to the one or more identity qualities from the applicant and the one or more characteristics for the submission. The score provides a confidence level indicative of the authenticity and authorization associated with the submission.
-
Citations
21 Claims
-
1. A computer implemented method for managing privacy information, comprising:
-
receiving a request from a requestor for the privacy information of an entity as a result of a submission by an applicant;
creating a privacy transaction in a database for the privacy information including one or more identity qualities from the applicant and one or more characteristics for the submission; and
scoring the privacy transaction according to the one or more identity qualities from the applicant and the one or more characteristics for the submission to provide a confidence level indicative of the authenticity and authorization of the submission. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer implemented method of managing privacy information comprising:
-
receiving a request from an applicant for a privacy management provider to manage privacy information of an entity;
verifying an identity of the applicant'"'"'s identity as authentic against an identification database and further verifying authorization against an authorization database to ensure applicant'"'"'s authority to delegate management of the privacy information for the entity; and
generating an indication in a database holding the privacy information that managing the privacy information has been delegated to a privacy management provider. - View Dependent Claims (14, 15)
-
-
16. A computer program product for managing privacy information, tangibly stored on a computer-readable medium, comprising instructions operable to cause a programmable processor to:
-
receive a request from a requestor for the privacy information of an entity as a result of a submission by an applicant;
create a privacy transaction in a database for the privacy information including one or more identity qualities from the applicant and one or more characteristics for the submission; and
score the privacy transaction according to the one or more identity qualities from the applicant and the one or more characteristics for the submission to provide a confidence level indicative of the authenticity and authorization of the submission. - View Dependent Claims (17, 18, 19)
-
-
20. A computer program product for managing privacy information, tangibly stored on a computer-readable medium, comprising instructions operable to cause a programmable processor to:
-
receive a request from an applicant for a privacy management provider to manage privacy information of an entity;
verify an identity of the applicant'"'"'s identity as authentic against an identification database and further verifying authorization against an authorization database to ensure applicant'"'"'s authority to delegate management of the privacy information for the entity; and
generate an indication in a database holding the privacy information that managing the privacy information has been delegated to a privacy management provider. - View Dependent Claims (21)
-
Specification