METHOD AND SYSTEM FOR SECURE SHARING OF PERSONAL INFORMATION
First Claim
1. A system comprising:
- a communications module to receive a request for personal information of a user, the personal information associated with a permanent identification of the usera detector to determine that the request includes a proxy identification key, the proxy identification key being a substitute for the permanent identification of the user;
a matching module to determine that the proxy identification key is associated with the user;
a data retrieval module to obtain the requested personal information of the user; and
a delivery module to deliver the obtained personal information of the user to an originator of the request.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and a system for secure sharing of personal information are provided. The system may include a communications module to receive a request for personal information of a user, a detector to determine that the request includes a proxy identification key, a matching module to determine that the proxy identification key is associated with the user, a data retrieval module to obtain the requested personal information of the user; and a delivery module to deliver the obtained personal information of the user to an originator of the request. The personal information may be associated with a permanent identification information of the user. The proxy identification key may be viewed as a substitute for the permanent identification information of the user. The proxy identification key may provide additional security by imposing certain restrictions such as the amount of data sharing.
122 Citations
58 Claims
-
1. A system comprising:
-
a communications module to receive a request for personal information of a user, the personal information associated with a permanent identification of the user a detector to determine that the request includes a proxy identification key, the proxy identification key being a substitute for the permanent identification of the user; a matching module to determine that the proxy identification key is associated with the user; a data retrieval module to obtain the requested personal information of the user; and a delivery module to deliver the obtained personal information of the user to an originator of the request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
receiving a request for personal information of a user, the personal information associated with permanent identification information of the user; determining that the request includes a proxy identification key, the proxy identification key being a substitute for the permanent identification information of the user; determining that the proxy identification key is associated with the user; obtaining the requested personal information of the user; and communicating the obtained personal information of the user to an originator of the request. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method comprising:
-
generating a first proxy identification key for a user, the first proxy identification key being a substitute for the permanent identification information of the user; storing the first proxy identification key in a profiles database; receiving a request to determine whether the first proxy identification key is associated with a second proxy identification key; generating a response based on a determination of whether the second proxy identification key is associated with the profile of the user. - View Dependent Claims (30)
-
-
31. A machine-readable medium having instruction data to cause a machine to:
-
receive a request for personal information of a user, the personal information associated with permanent identification information of the user determine that the request includes a proxy identification key, the proxy identification key being a substitute for the permanent identification information of the user; determine that the proxy identification key is associated with the user; obtain the requested personal information of the user; and deliver the obtained personal information of the user to an originator of the request.
-
-
32. A system comprising:
-
a communications module to receive a request for personal information of a user; a detector to; determine that the request includes a proxy identification key and a permanent identification of the user, determine one or more restrictions associated with the proxy identification key, and determine that the one or more restrictions do not preclude the request for personal information of the user; a matching module to determine that the proxy identification key is associated with the permanent identification of the user; a data retrieval module to access the permanent identification of the user; and a delivery module to deliver the permanent identification of the user to an originator of the request. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39)
-
-
40. A system comprising:
-
a communications module to receive a request for a permanent identification of the user; a detector to determine that the request includes a proxy identification key, the proxy identification key being a substitute for the permanent identification of the user; a matching module to determine that the proxy identification key is associated with the user; a data retrieval module to access the permanent identification of the user; and a delivery module to deliver the permanent identification of the user to a destination. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58)
-
Specification