Tools for access to databases via internet protocol networks
First Claim
1. Apparatus comprising:
- a trusted intermediary computer screen user interface, to which a given human trusted intermediary is given access upon presenting his or her trusted intermediary credentials to a trusted intermediary computer system including the trusted intermediary computer screen user interface, the given human trusted intermediary obtaining access to the trusted intermediary computer screen user interface upon being approached by a human authorized information seeker different than and independent from the given human trusted intermediary;
an identification information input to receive, via the trusted intermediary interacting with the trusted intermediary computer screen user interface, information identifying an authorized information seeker seeking access to protected content, to which the information seeker is already authorized to access, the access being sought by the authorized information seeker being sought at a remote database via an internet protocol connection;
an authorization confirmation display to display to the trusted intermediary, via the trusted intermediary computer screen user interface, that the authorized information seeker is confirmed as authorized to access the remote database;
an access code request input to request, via the trusted intermediary interacting with the trusted intermediary computer screen user interface, an access code for use by the authorized information seeker to access the remote database via the internet protocol connection; and
an access code output to output the access code for use by the authorized information seeker.
1 Assignment
0 Petitions
Accused Products
Abstract
One embodiment is directed to apparatus. In the apparatus, a trusted intermediary computer screen user interface is provided. An identification information input receives, via the computer screen user interface, information identifying an authorized information seeker. The information seeker seeks access to a remote database via an internet protocol connection. An authorization confirmation display displays, via the computer screen user interface, that the authorized information seeker is confirmed as authorized to access the remote database. An access code request input requests, via the computer screen user interface, an access code for use by the authorized information seeker to access the remote database via the internet protocol connection. An access code output outputs the access code for use by the authorized information seeker.
126 Citations
23 Claims
-
1. Apparatus comprising:
-
a trusted intermediary computer screen user interface, to which a given human trusted intermediary is given access upon presenting his or her trusted intermediary credentials to a trusted intermediary computer system including the trusted intermediary computer screen user interface, the given human trusted intermediary obtaining access to the trusted intermediary computer screen user interface upon being approached by a human authorized information seeker different than and independent from the given human trusted intermediary; an identification information input to receive, via the trusted intermediary interacting with the trusted intermediary computer screen user interface, information identifying an authorized information seeker seeking access to protected content, to which the information seeker is already authorized to access, the access being sought by the authorized information seeker being sought at a remote database via an internet protocol connection; an authorization confirmation display to display to the trusted intermediary, via the trusted intermediary computer screen user interface, that the authorized information seeker is confirmed as authorized to access the remote database; an access code request input to request, via the trusted intermediary interacting with the trusted intermediary computer screen user interface, an access code for use by the authorized information seeker to access the remote database via the internet protocol connection; and an access code output to output the access code for use by the authorized information seeker. - View Dependent Claims (2, 3)
-
-
4. Apparatus comprising:
-
a credential issuing system to provide to a trusted intermediary unique third party identifying credentials to issue to an authorized third party, the credential issuing system being accessible to a given human trusted intermediary upon presenting his or her trusted intermediary credentials to a trusted intermediary computer system, the given human trusted intermediary obtaining access to the credential issuing system upon being approached by a human authorized third party different than and independent from the given human trusted intermediary; a third party information system to maintain information on authorized third parties including the authorized third party; and a verification system to verify the identity of an authorized third party based on the third party identifying credentials, the verification system being configured to receive the third party identifying credentials via input by the given human trusted intermediary. - View Dependent Claims (5, 6, 7, 8, 9, 10)
-
-
11. Apparatus comprising:
-
means for providing trusted intermediaries with unique identifying credentials to issue to an authorized third party after verification of the identity of the authorized third party, the unique identifying credentials enabling the authorized third party to access protected information, the means for providing trusted intermediaries with unique identifying credentials being accessible to a given human trusted intermediary upon presenting his or her trusted intermediary credentials to a trusted intermediary computer system, the given human trusted intermediary obtaining access to the credential issuing system upon being approached by a human authorized third party different than and independent from the given human trusted intermediary; means for storing and providing information on authorized third parties; and means for verifying the identifying credentials before providing the protected information, the means for verifying being configured to receive the third party identifying credentials via input by the given human trusted intermediary. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
a given human trusted intermediary verifying, upon being approached by a third party information requester already being entitled to access protected information including sensitive patient medical data, via a trusted intermediary computer system to which the given human trusted intermediary was given access upon presenting his or her trusted intermediary credentials to the trusted intermediary computer, both the identity of a third party information requester and the third party information requester'"'"'s entitlement to the protected information, wherein the trusted intermediary computer system is configured to permit trusted intermediaries to have access to the trusted intermediary computer by requiring respective trusted intermediary credentials; the human trusted intermediary learning, from the trusted intermediary computer system, and issuing to the third party information requester unique identifying authorized third party credentials; and a health services provider different than the human trusted intermediary disclosing patient medical data to the third party information requester after the third party information requester has provided the unique identifying credentials to the health services provider. - View Dependent Claims (19, 20, 21, 22, 23)
-
Specification