SECURE ACCESS TO INDIVIDUAL INFORMATION
First Claim
1. A method of one or more computing devices for targeting individual information to a storage device, comprisingat a time when the storage device is accessible by a first computing device, in the first computing device:
- (a) causing to be stored in the storage device an identifier of individual information;
at a time when the storage device is not accessible by the first computing device, in the first computing device;
(b) obtaining the individual information;
(c) encrypting the individual information with a public key associated with the storage device;
(d) causing the encrypted individual information to be stored on an Internet-connected server in connection with the individual information identifier;
at a time when the storage device is accessible by a second computing device, in the second computing device;
(e) causing the individual information identifier to be retrieved from the storage device;
(f) using the retrieved individual information identifier to retrieve the encrypted individual information from the server; and
(g) causing to be stored on the storage device the retrieved encrypted individual information.
1 Assignment
0 Petitions
Accused Products
Abstract
A facility for accessing information relating to a person is described. In a reader device, the facility accesses first credentials stored in a first storage device, second credentials stored in a second storage device, and third credentials stored in the reader device. In the reader device, the facility uses a combination of the first credentials, second credentials, and third credentials to decrypt information relating to the person stored in the first storage device.
-
Citations
48 Claims
-
1. A method of one or more computing devices for targeting individual information to a storage device, comprising
at a time when the storage device is accessible by a first computing device, in the first computing device: -
(a) causing to be stored in the storage device an identifier of individual information; at a time when the storage device is not accessible by the first computing device, in the first computing device; (b) obtaining the individual information; (c) encrypting the individual information with a public key associated with the storage device; (d) causing the encrypted individual information to be stored on an Internet-connected server in connection with the individual information identifier; at a time when the storage device is accessible by a second computing device, in the second computing device; (e) causing the individual information identifier to be retrieved from the storage device; (f) using the retrieved individual information identifier to retrieve the encrypted individual information from the server; and (g) causing to be stored on the storage device the retrieved encrypted individual information. - View Dependent Claims (2, 3, 4, 5)
-
-
6-19. -19. (canceled)
-
20. A portable storage device configured to store health information for a person and configured to be carried by the person, comprising:
-
a first storage region configured to store health information for the person encrypted with a public key established for the person; and a second storage region configured to store a private key established for the person corresponding to the public key established for the person that can be used in a process to decrypt the encrypted health information for the person stored in the first storage region. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A data access device configured to access personal information on a portable storage device, the data access device comprising:
-
a first interface configured to communicatively connect the data access device to a portable storage device containing encrypted health information for a person; and a controller configured to interact with the encrypted health information contained by the portable storage device. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48-54. -54. (canceled)
Specification