Systems and methods for authorization of information access
First Claim
1. A method for approving access to or use of personal information correlated to a governmentally issued identifier, said method comprising the steps of:
- receiving a verification communication from a verification system;
transmitting a first client identifier to said verification system;
transmitting said second client identifier to said verification system; and
transmitting a subscriber verification response to said verification system.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods according to the present invention provide a proactive approach to controlling access to information that may be correlated with a governmentally issued personal identifier. Included are systems and methods for proactive control of information access and liability incursion. Further included are systems and methods for emulating information access to an authorized person. Generally, a method according to the present invention includes the steps of requesting verification from a subscriber at any time that information is requested from registered information holders and any time that liability may be incurred through registered information holders. In this way, the subscriber, rather than reacting to invasive information or identity theft, may proactively control access to such information, thereby preventing the theft in the first place.
-
Citations
69 Claims
-
1. A method for approving access to or use of personal information correlated to a governmentally issued identifier, said method comprising the steps of:
-
receiving a verification communication from a verification system; transmitting a first client identifier to said verification system; transmitting said second client identifier to said verification system; and transmitting a subscriber verification response to said verification system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for verifying access to personal information correlated to a governmentally issued identifier, said method comprising the steps of:
-
receiving a system verification request; initiating a verification communication; waiting until the expiry of a response time; and replying to said system verification request with a system verification response. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A method of managing online account profile information, said method comprising the steps of:
-
registering a first client identifier; synchronizing to a second client identifier; receiving said first client identifier from a subscriber; receiving said second client identifier from said subscriber; creating an emulation session communication link; providing a selection of servers to said subscriber, said servers being connected to an information network; receiving a user selection of one of said servers; logging into said selected server using a site username and an initial site password, thereby enabling access to information correlated with an identifier that has been governmentally issued to said subscriber, wherein said information is accessible by said selected server; communicating with said selected server to change said site password, thereby creating a modified site password; overwriting said initial site password with said modified site password; and terminating said emulation session communication link. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51)
-
-
52. A system comprising:
-
a web server; a database accessible by said web server, said database correlating a static client identifier, a variable static client identifier, a governmentally issued identifier and at least one communication address with a client; a communications server communicatively coupled to said web server and adapted to transmit a subscriber verification request to at least one communication address. - View Dependent Claims (53, 54, 55, 56, 57, 58, 59, 60, 61)
-
-
62. A method of registering a client with a verification system, said method comprising the steps of:
-
receiving a sign-up request from a client; receiving initial profile information from said client; providing a service list to said client, said service list comprising at least one information protection service; receiving a selection from said client, said selection indicating an information protection service provided in said service list; validating said initial profile information; creating a protection service account; receiving a login request at a web server, said login request comprising at least some of said initial profile information; validating said login request; receiving a governmentally issued identifier corresponding to said client; and correlating said governmentally issued identifier with said protection service account. - View Dependent Claims (63, 64, 65, 66, 67, 68, 69)
-
Specification