Consumer-controlled limited and constrained access to a centrally stored information account
First Claim
1. A computer-implemented method for providing access to consumer information comprising:
- storing an information account in a central data repository that is accessible via a distributed computer network, the information account containing consumer information elements that are changed by the consumer;
associating consumer authentication information with the information account using a server such that access to the information account by the consumer is conditioned upon receipt and verification of the consumer authentication information by the server;
further associating a temporary authorization with the information account using an authentication module running on the server, the temporary authorization having consumer-defined attributes that define access privileges that will be granted to a person who presents the temporary authorization along with a request for access to the information account;
receiving the temporary authorization from the distributed computer network;
comparing the temporary authorization to data in an authentication table associated with the information account using the authentication module in order to determine at least one of;
whether the temporary authorization is being used by an authorized party who is not the consumer, whether the temporary authorization has expired, and what level of access to the information account is associated with the temporary authorization; and
granting a level of access to the information account by the authentication module based on the temporary authorization if the temporary authorization is found valid based on the comparing step.
8 Assignments
0 Petitions
Accused Products
Abstract
Consumer authentication information is associated with an information account stored in a central database, such that access to the information account by the consumer is conditioned upon receipt and verification of the consumer authentication information. A temporary authorization may also be associated with the information account. The temporary authorization has consumer-defined attributes that define access privileges to be granted to a person who presents the temporary authorization along with a request for further access to the information account. The temporary authorization may be transmitted to the consumer for presentation to a third-party of the consumer'"'"'s choice. Alternately, the temporary authorization may be transmitted to a designated third-party or device on behalf of the consumer.
255 Citations
59 Claims
-
1. A computer-implemented method for providing access to consumer information comprising:
-
storing an information account in a central data repository that is accessible via a distributed computer network, the information account containing consumer information elements that are changed by the consumer; associating consumer authentication information with the information account using a server such that access to the information account by the consumer is conditioned upon receipt and verification of the consumer authentication information by the server; further associating a temporary authorization with the information account using an authentication module running on the server, the temporary authorization having consumer-defined attributes that define access privileges that will be granted to a person who presents the temporary authorization along with a request for access to the information account; receiving the temporary authorization from the distributed computer network; comparing the temporary authorization to data in an authentication table associated with the information account using the authentication module in order to determine at least one of;
whether the temporary authorization is being used by an authorized party who is not the consumer, whether the temporary authorization has expired, and what level of access to the information account is associated with the temporary authorization; andgranting a level of access to the information account by the authentication module based on the temporary authorization if the temporary authorization is found valid based on the comparing step. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method for providing access to consumer information comprising:
-
presenting to a host server via a distributed computer network a request for access by a consumer to an information account along with consumer authentication information, the information account being stored in a central data repository that is accessible by the host server via the distributed computer network, the information account containing consumer information elements that are changed by the consumer; receiving from the host server an acknowledgment that the consumer has been authenticated based on the consumer authentication information and thereby granted access to the information account; in response to the acknowledgment, transmitting to the host server a request by the consumer for generation of a temporary authorization having consumer-defined attributes that define access privileges that are granted to a person who presents the temporary authorization along with a subsequent request for access to the information account; receiving the temporary authorization from the distributed computer network with an authentication module running on the host server; comparing the temporary authorization to data in an authentication table associated with the information account using the authentication module in order to determine at least one of;
whether the temporary authorization is being used by an authorized party who is not the consumer, whether the temporary authorization has expired, and what level of access to the information account is associated with the temporary authorization; andgranting a level of access to the information account with the authentication module based on the temporary authorization if the temporary authorization is found valid based on the comparing step. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer-implemented method for providing access to consumer information via a distributed computer network comprising:
-
receiving a request with a first server for access to an information account and consumer authentication information from a client device executing a browser, the information account being stored in a central data repository and containing consumer information elements that are changed by the consumer; authenticating the consumer with the first server to access the information account based on the consumer authentication information; in response to authenticating the consumer by the first server to access the information account based on the consumer authentication information, generating a temporary authorization with an authentication module running on the first server having consumer-defined attributes that define access privileges that are granted to an entity that presents the temporary authorization along with a further request for access to the information account; embedding the temporary authorization as a parameter in a uniform resource locator with the authentication module and redirecting the browser of the client device with the first server to a web page hosted by a second server and associated with a third-party using the uniform resource locator; subsequently receiving a communication with the first server from the second server hosting the web page comprising the further request for access to the information account along with the temporary authorization; and in response to receiving the temporary authorization with the first server, authenticating the third-party with the authentication module to access the information account according to the access privileges associated with the temporary authorization. - View Dependent Claims (24, 25, 26, 27, 28, 29)
-
-
30. A compute system for providing access to consumer information comprising:
-
a central data repository accessible via a distributed computer network for storing an information account containing consumer information elements that are changed accessed, retrieved and altered by the consumer; a communication device for receiving from the consumer via the distributed computer network consumer authentication information, a request for a temporary authorization and consumer-defined attributes defining access privileges that are granted to a person who presents the temporary authorization along with a request for further access to the information account; and a processor configured for executing computer-executable instructions for; in response to receiving the consumer, authentication information, accessing an authentication table to determine whether the consumer authentication information is associated with the information account, such that the consumer may be provided with access to the information account, in response to determining that the consumer authentication information is associated with the information account and in response to the request for the temporary authorization, generating the temporary authorization having the consumer-defined attributes; receiving the temporary authorization from the distributed computer network; comparing the temporary authorization to data in the authentication table associated with the information account in order to determine at least one of;
whether the temporary authorization is being used by at least one of an authorized person and authorized third-party who is not the consumer, whether the temporary authorization has expired, and what level of access to the information account is associated with the temporary authorization; andgranting a level of access to the information account based on the temporary authorization if the temporary authorization is found valid based on the comparing step. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A computer-implemented method for providing access to an information account, comprising the steps of:
-
storing the information account on a central data repository; receiving with a server, over a distributed computer network, requests from different network devices for access to the information account, each of said requests comprising an authorization identifier; in response to each of the requests, comparing each authorization identifier to data in an authentication table associated with the information account using an authentication module running on the server in order to determine at least one of;
whether the authorization identifier is being used by an authorized party who is not the consumer, whether the authorization identifier has expired, and what level of access to the information account is associated with the authorization identifier;if the comparing step is successful for a particular authorization identifier, then retrieving a set of authorization parameters associated with the particular authorization identifier using the authentication module, said authorization parameters being defined by the entity whose information is stored in the information account; and granting access to each of the network devices the authentication module if the comparing step is successful and in accordance with the authorization parameters retrieved in response to the network device'"'"'s request. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. A system for providing access to an information account, comprising:
-
a data repository storing an information account; a computer network interface for receiving, over a distributed computer network, requests from different network devices for access to the information account, each of said requests comprising an authorization identifier; and a processor for comparing each authorization identifier to data in an authentication table associated with the information account in order to determine at least one of;
whether the authorization identifier is being used by an authorized party who is not the entity whose information is stored in the information account whether the authorization identifier has expired, and what level of access to the information account is associated with the authorization identifier, said processor configured to retrieve a set of authorization parameters associated with the authorization identifier if a comparison between a respective authorization identifier and data in the authentication table is successful, said processor granting access to each of the network devices in accordance with the authorization parameters retrieved in response to the network device'"'"'s request and if a comparison between a respective authorization identifier and data in the authentication table is successful;wherein said authorization parameters are defined by the entity whose information is stored in the information account. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55, 56)
-
-
57. A computer-implemented method for providing selective access to a consumer information account, the method comprising the steps of:
-
storing data for a consumer information account; providing an interface whereby an owner of the consumer information account can specify the terms by which third parties can access the consumer information account; storing the terms for future use in an authentication module of a server; associating the stored terms with one or more authorization tickets; transmitting the authorization tickets to specified third parties; receiving the authorization tickets from a distributed computer network; comparing the authorization tickets to data in the authentication table associated with the consumer information account using the authentication module in order to determine at least one of;
whether the authorization ticket is being used by an authorized third-party who is not the consumer, whether the temporary authorization has expired, and what level of access to the information account is associated with the temporary authorization; andgranting a level of access to the consumer information account based on the authorization ticket if the authorization ticket is found valid based on the comparing step. - View Dependent Claims (58, 59)
-
Specification