Method and system for granting access to personal information
First Claim
1. A method for granting access to personal information of said first person, said method comprising:
- said first person selecting a personal unique identifier to uniquely identify said first person in a database;
storing the personal information of the first person in association with personal unique identifier of the person in the database;
providing the personal unique identifier of the first person to a second person; and
said second person submitting the personal unique identifier into the database to retrieve said personal information of the first person.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method to permit users to have personal unique identifiers associated with personal information stored on a database accessed by an identity server is disclosed. The identity server is connected to one or more networks including the Internet. Users can distribute the personal unique identifier to third parties who can then obtain the personal information by accessing the server through the network. The users may modify the information stored in the database, which can then assist third parties in obtaining the modified information by inputting the personal unique identifier, or permitting client software to do so automatically on their behalf, in turn making updates to that information for the third party. This can be done over a large period of time such that third parties can easily access personal information of the user even if that information changes. The third parties may also be organizations or corporations with extensive customer lists that wish to update their client contact information with minimum interference to the customers and at minimal costs to the organization. Furthermore, users can use the personal unique identifier to populate electronic forms, such as web forms, provided on web sites hosted by organization or corporation, for the convenience of the organization or corporation and the use. The personal information of the user may also be organized in different cards having a variety of reveal and hidden status levels permitting access to additional information if a key, comprising an alphanumeric code, is entered together with the unique identifier.
-
Citations
19 Claims
-
1. A method for granting access to personal information of said first person, said method comprising:
-
said first person selecting a personal unique identifier to uniquely identify said first person in a database;
storing the personal information of the first person in association with personal unique identifier of the person in the database;
providing the personal unique identifier of the first person to a second person; and
said second person submitting the personal unique identifier into the database to retrieve said personal information of the first person.
-
-
2. A method for facilitating access to personal information, said method comprising:
-
selecting a personal unique identifier to uniquely identify a user in a database controlled by a personal unique identifier server;
storing personal information regarding the user in the database associated with the personal unique identifier;
providing the unique identifier to at least one other person, other than the user; and
the at least one person submitting the unique identifier to the personal unique identifier server to access the personal information associated with the personal unique identifier stored in the database, said personal information reflecting personal information submitted by the user. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
-
9. A system for controlling access to personal information, said system comprising:
-
a database containing a plurality of personal unique identifiers, each personal unique identifier uniquely identifying personal information of a particular user associated with the corresponding unique personal identifier; and
a personal unique identifier server for providing access to the personal information stored in the database;
wherein the user can provide their personal unique identifier to at least one person, other than the user, such that said at least one other person can access the personal information of the user associated with the unique personal identifier through the personal unique identifier server. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification