Consumer-controlled limited and constrained access to a centrally stored information account
8 Assignments
0 Petitions
Accused Products
Abstract
Consumer authentication information is associated with an information account stored in a central database, such that access to the information account by the consumer is conditioned upon receipt and verification of the consumer authentication information. A temporary authorization may also be associated with the information account. The temporary authorization has consumer-defined attributes that define access privileges to be granted to a person who presents the temporary authorization along with a request for further access to the information account. The temporary authorization may be transmitted to the consumer for presentation to a third-party of the consumer'"'"'s choice. Alternately, the temporary authorization may be transmitted to a designated third-party or device on behalf of the consumer.
175 Citations
79 Claims
-
1-59. -59. (canceled)
-
60. A computer-implemented method for providing access to consumer information comprising:
-
storing an information account in a central data repository that is accessible via a distributed computer network;
associating consumer authentication information with the information account using a server such that access to the information account by the consumer is conditioned upon receipt and verification of the consumer authentication information by the server;
associating a temporary authorization with the information account using an authentication module running on the server, receiving the temporary authorization from the distributed computer network;
comparing the temporary authorization to data in an authentication table associated with the information account using tie authentication module in order to determine at least one of;
whether the temporary authorization is being used by an authorized party who is not the consumer, whether the temporary authorization has expired, and what level of access to the information account is associated with the temporary authorization; and
granting a level of access to the information account by the authentication module based on the temporary authorization. - View Dependent Claims (61, 62, 63, 64, 65, 66, 67)
-
-
68. A computer-implemented method for providing access to consumer information comprising:
-
presenting to a host server via a distributed computer network a request for access by a consumer to an information account and consumer authentication information, the information account being stored in a central data repository that is accessible by the host server via the distributed computer network;
receiving from the host server an acknowledgment that the consumer has been authenticated based on the consumer authentication information;
in response to the acknowledgment, transmitting to the host server a request for generation of a temporary authorization that define access privileges and that used by an entity different than the consumer who presents the temporary authorization along with a subsequent request for access to the information account;
comparing the temporary authorization to data in an authentication table associated with the information account using an authentication module in order to determine at least one of;
whether the temporary authorization is being used by an authorized party who is not the consumer, whether the temporary authorization has expired, and what level of access to the information account is associated with the temporary authorization; and
granting a level of access to the information account with the authentication module based on the temporary authorization. - View Dependent Claims (69, 70, 71, 72)
-
-
73. A computer system for providing access to consumer information comprising:
-
a central data repository accessible via a distributed computer network for storing an information account containing consumer information elements;
a communication device for receiving via the distributed computer network consumer authentication information, for receiving a request for a temporary authorization and consumer-defined attributes defining access privileges that are granted to an entity different from the consumer who presents the temporary authorization along with a request for further access to the information account; and
a processor configured for executing computer-executable instructions for generating the temporary authorization having attributes defined by the consumer, for receiving the temporary authorization from the distributed computer network, for comparing the temporary authorization to data in the authentication table associated with the information account in order to determine at least one of whether the temporary authorization is being used by the entity, whether the temporary authorization has expired, and what level of access to the information account is associated wit the temporary authorization; and
the processor granting a level of access to the information account based on the temporary authorization if the temporary authorization is found valid by the processor. - View Dependent Claims (74, 75, 76, 77, 78, 79)
-
Specification