SYSTEMS AND METHODS FOR ACCESS-CONTROLLED INTERACTIONS
First Claim
1. A computer implemented method for controlling access to and interaction with user resources, the method comprising:
- associating, in a storage device, a single, unique public identifier with a user, the single, unique public identifier usable to receive a plurality of types of interactions;
receiving a first interaction addressed to the single, unique public identifier from a sender, the first interaction comprising an access code;
a processor determining, based on at least the access code, whether the first interaction should be provided to one or more user resources associated with the single, unique public identifier;
if the first interaction should be provided;
selecting at least a first user resource; and
providing the first interaction to at least the first user resource;
receiving an indication from the user that the sender is trusted; and
providing additional interactions from the sender to at least one of the one or more user resources without evaluating access codes.
3 Assignments
0 Petitions
Accused Products
Abstract
An interaction server controls access between a plurality of senders and/or users exchanging electronic interactions. A sender may identify a user with whom the sender desires to interact using a public identifier associated with the user. The interaction server may coordinate the desired interaction without revealing private information, such as information about private user resources (e.g., personal contact information, personal payment information, personal data, etc.). The interaction server may determine whether to provide an interaction by evaluating an access code, by determining whether a user is trusted, and/or the like. The interaction server may provide the interaction, a notice of the interaction, a payload associated with the interaction, and/or the like to a user resource associated with the public identifier if access is allowed.
-
Citations
30 Claims
-
1. A computer implemented method for controlling access to and interaction with user resources, the method comprising:
-
associating, in a storage device, a single, unique public identifier with a user, the single, unique public identifier usable to receive a plurality of types of interactions; receiving a first interaction addressed to the single, unique public identifier from a sender, the first interaction comprising an access code; a processor determining, based on at least the access code, whether the first interaction should be provided to one or more user resources associated with the single, unique public identifier; if the first interaction should be provided; selecting at least a first user resource; and providing the first interaction to at least the first user resource; receiving an indication from the user that the sender is trusted; and providing additional interactions from the sender to at least one of the one or more user resources without evaluating access codes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for controlling access to and interaction with user resources, the system comprising:
-
a registration module configured to associate a single, unique public identifier with a user, the single, unique public identifier usable to receive a plurality of types of interactions; an access module configured to; receive a first interaction addressed to the single, unique public identifier from a sender, the first interaction comprising an access code, and determine, based on at least the access code, whether the first interaction should be provided to one or more user resources associated with the single, unique public identifier; and a fulfillment module configured to, in response to a determination the first interaction should be provided; select at least a first user resource, and provide the first interaction to at least the first user resource, wherein the access module is further configured to receive an indication from the user that the sender is trusted, and wherein the fulfillment module is further configured to provide additional interactions from the sender to at least one of the one or more user resource without evaluating access codes in response to receiving the indication that the sender is trusted. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A computer readable storage medium comprising program code for performing a method of controlling access to and interaction with user resources, the method comprising:
-
associating, in a storage device, a single, unique public identifier with a user, the single, unique public identifier usable to receive a plurality of types of interactions; receiving a first interaction addressed to the single, unique public identifier from a sender, the first interaction comprising an access code; determining, based on at least the access code, whether the first interaction should be provided to one or more user resources associated with the single, unique public identifier; if the first interaction should be provided; selecting at least a first user resource; and providing the first interaction to at least the first user resource; receiving an indication from the user that the sender is trusted; and providing additional interactions from the sender to at least one of the one or more user resources without evaluating access codes.
-
Specification