METHOD AND SYSTEM FOR PROVIDING PERMISSION-BASED ACCESS TO SENSITIVE INFORMATION
First Claim
1. A method for providing permission-based access to personal information over a communication network, the method comprising:
- entering specified owner personal information in an owner terminal, by an owner, to establish a secure owner profile;
storing the secure owner profile in an owner database;
entering specified user personal information in a user terminal, by a user, to establish a secure user profile;
storing the secure user profile in a user database;
entering a user request in the user terminal requesting permission to use a designated piece of the owner personal information from the secure owner profile;
determining, by a server, whether to approve the user request; and
providing permission to use the designated piece of the owner personal information to the user over the communication network after the user request is approved by the server.
1 Assignment
0 Petitions
Accused Products
Abstract
A method provides for permission-based access to personal information over a communication network. The method includes entering specified owner personal information in an owner terminal, by an owner, to establish a secure owner profile, which is stored in an owner database. The method also includes entering specified user personal information in a user terminal, by a user, to establish a secure user profile, which is stored in a user database. The method further includes entering a user request in the user terminal requesting permission to receive a designated piece of the owner personal information from the secure owner profile. A server determines whether to approve the user request; and provides permission to use the designated piece of the owner personal information to the user over the communication network after the user request is approved by the server.
22 Citations
20 Claims
-
1. A method for providing permission-based access to personal information over a communication network, the method comprising:
-
entering specified owner personal information in an owner terminal, by an owner, to establish a secure owner profile; storing the secure owner profile in an owner database; entering specified user personal information in a user terminal, by a user, to establish a secure user profile; storing the secure user profile in a user database; entering a user request in the user terminal requesting permission to use a designated piece of the owner personal information from the secure owner profile; determining, by a server, whether to approve the user request; and providing permission to use the designated piece of the owner personal information to the user over the communication network after the user request is approved by the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable storage medium, encoded with a computer-executable program for providing permission-based access to personal information, comprising:
-
an owner entering segment for entering specified owner personal information in an owner terminal, by an owner, to establish a secure owner profile; an owner storing segment for storing the secure owner profile in an owner database; a user entering segment for entering specified user personal information in a user terminal, by a user, to establish a secure user profile; a user storing segment for storing the secure user profile in a user database; a user entering segment for entering a user request in the user terminal requesting permission to, receive a designated piece of the owner personal information from the secure owner profile; a determining segment for determining, by a server, whether to approve the user request; and a providing segment for providing access to the designated piece of the owner personal information to the user over the communication network after the user request is approved by the server.
-
-
20. A system for providing permission-based access to personal information over a communication network, comprising:
-
an electronic owner database that stores at least one secure owner profile, the at least one secure owner profile including specified owner personal information, which was entered into the system by an owner terminal; an electronic user database that stores at least one secure user profile, the at least one secure user profile including specified user personal information, which was entered into the system by a user terminal; and a server that receives at least one user request entered into the system by the user terminal, the at least one user request requesting permission to use a designated piece of owner personal information from the secure owner profile, wherein the server provides access to the designated piece of the owner personal information to the user over the communication network after the user request has been approved by the server.
-
Specification