Method and system for secure information brokering
First Claim
1. A method for providing secure information comprising:
- receiving a first request to obtain confidential data from a user;
obtaining the confidential data responsive to the first request;
providing the user with a list of service providers;
receiving a second request from the user to provide confidential data to a plurality of service providers selected from the list of service providers;
abstracting the confidential data responsive to the second request;
storing the abstracted confidential data in a secure information broker; and
providing the abstracted confidential data stored in the secure information broker responsive to the second request, wherein providing further comprises transmitting the abstracted confidential data to the plurality of service providers that are selected responsive to the second request.
0 Assignments
0 Petitions
Accused Products
Abstract
Secure information brokering according to the present disclosure provides a technique for a potential tenant seeking to rent or to lease real estate to have their credit and identity information verified by a secure information broker. The secure information broker may then provide the verified information to the property owner or manager of the real estate as well as to other service or commodity providers. This technique expedites the real estate rental or lease application process, preserves the potential tenant'"'"'s credit score, and exposes the potential tenant to other services available based on the credit score. This process may also be used to engage any or all of the service or commodity providers ancillary to any real estate transaction.
-
Citations
15 Claims
-
1. A method for providing secure information comprising:
-
receiving a first request to obtain confidential data from a user;
obtaining the confidential data responsive to the first request;
providing the user with a list of service providers;
receiving a second request from the user to provide confidential data to a plurality of service providers selected from the list of service providers;
abstracting the confidential data responsive to the second request;
storing the abstracted confidential data in a secure information broker; and
providing the abstracted confidential data stored in the secure information broker responsive to the second request, wherein providing further comprises transmitting the abstracted confidential data to the plurality of service providers that are selected responsive to the second request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for providing secure information comprising:
-
a secure information broker for receiving a first request for confidential data from a user; and
an abstract of confidential data stored within the secure information broker, wherein the secure information broker transmits a query requesting confidential data from commercial and public databases;
wherein the secure information broker provides the user with a list of service providers for selecting a plurality of service providers;
wherein the secure information broker receives a second request to provide the abstract of confidential data to the plurality of service providers; and
wherein, the secure information broker receives credit history reports and background verification checks from the commercial and public databases;
wherein the abstract comprises selected data items from the credit history reports and background reports responsive to the second request. - View Dependent Claims (11)
-
-
12. A method for providing secure information comprising:
-
providing identity and background data of a user to a primary provider;
submitting a request to a data source to obtain confidential data of a user from the primary provider;
abstracting the confidential data of the user responsive to the request;
storing the abstracted confidential data of the user as an electronic file ID;
exchanging the electronic file ID of the user with a secondary provider for identity and background data;
providing the user with the electronic file ID of the user; and
providing the electronic file ID of the user to the secondary provider. - View Dependent Claims (13, 14, 15)
-
Specification