Persona-Notitia Intellection Codifier
First Claim
1. A method of isolating a nature of personal user information from unauthorized devices, comprising:
- receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith;
decrypting said PIC code into association with particular personal user information requested for said given user; and
providing said particular personal user information to a requesting device from which said PIC code is received.
2 Assignments
0 Petitions
Accused Products
Abstract
A persona-notitia intellection codifier (P-NIC) server intelligently codifies and disburses personal user information from a user device (smartphone, laptop, etc.) to a multiplicity of designee devices. Masking Persona-Notitia Intellection Codes (a.k.a. PICs) are created that each stipulate control(s) and parametric limitation(s) for the associated one of a variety of personal user information. The Persona-Notitia Intellection Codifier (P-NIC) server rapidly produces a mask comprising a multiple bit “key” value (i.e., a persona-notitia intellection code (PIC)) that is uniquely distinguishable from every other PIC that'"'"'s ever been generated for a given user. The value of the PIC is typically many bytes in length, and associates attributes to a unique key value that describes a desired subset of all the user'"'"'s available personal user information to be unlocked by the key value (i.e., by the PIC).
7 Citations
24 Claims
-
1. A method of isolating a nature of personal user information from unauthorized devices, comprising:
-
receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith; decrypting said PIC code into association with particular personal user information requested for said given user; and providing said particular personal user information to a requesting device from which said PIC code is received. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of isolating the nature of personal user information from unauthorized devices, comprising:
-
obtaining personal user information relating to a given user; encrypting a PIC code into a mapped association with said obtained personal user information relating to said given user, said PIC code not including any indication as to a nature of what personal user information is associated therewith; and providing said personal user information only to a requesting device that provides said encrypted PIC code. - View Dependent Claims (16, 17, 18, 19)
-
-
20. Apparatus for isolating a nature of personal user information from unauthorized devices, comprising:
-
means for receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith; means for decrypting said PIC code into association with particular personal user information requested for said given user; and means for providing said particular personal user information to a requesting device from which said PIC code is received.
-
-
21. A method of providing personal user information, comprising:
-
receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith; utilizing said PIC code identify particular personal user information requested for said given user; and providing said particular personal user information to a requesting device from which said PIC code is received. - View Dependent Claims (22, 23, 24)
-
Specification