Online repository for personal information
DCFirst Claim
1. A method for automatically disbursing a first party'"'"'s personal information to a second party authorized by the first party by transmitting said first party'"'"'s personal information from a server computer operated by a service provider, said server computer coupled to a database, the method comprising the steps of:
- establishing an account for the first party with the server computer;
assigning an identifier to the first party;
entering the first party'"'"'s personal information, said first party'"'"'s personal information comprising at least one of a plurality of information objects;
assigning, by the first party, at least one of a plurality of security levels to each information object at any granularity, thereby enabling access to individually selected portions of the first party'"'"'s personal information by individual receiving parties;
storing in the database the first party identifier, the information object and the security level assigned to the information object;
receiving a request, said request comprising at least the first party identifier;
in response to the request, selecting a first portion of the first party'"'"'s personal information objects that could be transmitted to a second party;
retrieving from the database the selected first portion of personal information objects;
securely transmitting the retrieved first portion of personal information objects to the second party;
obtaining a second party identifier;
if the second party is not authorized to receive the information, recording the second party identifier; and
rejecting the second party'"'"'s request for information.
2 Assignments
Litigations
0 Petitions
Accused Products
Abstract
Method and system for gathering, storing personal information on a server computer and releasing such information to authorized requesters. Several types of information are stored for release to different entities with appropriate authorization. Any modifications or updates are automatically notified to any authorized requesters. The requester optionally provides information about to whom and where to notify changes or updates. Such change or update notification is made by sending a notification to an electronic mailbox. A frequent unauthorized requester of information is tagged as “junk” requester, to whom no further information will be released.
383 Citations
3 Claims
-
1. A method for automatically disbursing a first party'"'"'s personal information to a second party authorized by the first party by transmitting said first party'"'"'s personal information from a server computer operated by a service provider, said server computer coupled to a database, the method comprising the steps of:
-
establishing an account for the first party with the server computer;
assigning an identifier to the first party;
entering the first party'"'"'s personal information, said first party'"'"'s personal information comprising at least one of a plurality of information objects;
assigning, by the first party, at least one of a plurality of security levels to each information object at any granularity, thereby enabling access to individually selected portions of the first party'"'"'s personal information by individual receiving parties;
storing in the database the first party identifier, the information object and the security level assigned to the information object;
receiving a request, said request comprising at least the first party identifier;
in response to the request, selecting a first portion of the first party'"'"'s personal information objects that could be transmitted to a second party;
retrieving from the database the selected first portion of personal information objects;
securely transmitting the retrieved first portion of personal information objects to the second party;
obtaining a second party identifier;
if the second party is not authorized to receive the information, recording the second party identifier; and
rejecting the second party'"'"'s request for information. - View Dependent Claims (2)
-
-
3. A method for automatically disbursing a first party'"'"'s personal information to a second party authorized by the first party by transmitting said first party'"'"'s personal information from a server computer operated by a service provider, said server computer coupled to a database, the method comprising the steps of:
-
establishing an account for the first party with the server computer;
assigning an identifier to the first party;
entering the first party'"'"'s personal information, said first party'"'"'s personal information comprising at least one of a plurality of information objects;
assigning, by the first party, at least one of a plurality of security levels to each information object at any granularity, thereby enabling access to individually selected portions of the first party'"'"'s personal information by individual receiving parties;
storing in the database the first party identifier, the information object and the security level assigned to the information object;
receiving a request, said request comprising at least the first party identifier;
in response to the request, selecting a first portion of the first party'"'"'s personal information objects that could be transmitted to a second party;
retrieving from the database the selected first portion of personal information objects, securely transmitting the retrieved first portion of personal information objects to the second party;
generating an authorization key;
providing the authorization key to the second party; and
encoding the authorization key with at least one of a plurality of criteria, generating an authorization key;
providing the authorization key to the second party;
wherein the at least one of a plurality of criteria includes a criterion to indicate the number of times the authorization key can be used by the second party to obtain access.
-
Specification