Methods and apparatus for authorizing access to data
First Claim
Patent Images
1. A method, comprising:
- receiving by a computer processor from a first party, a request for access to controlled data;
sending from the computer processor to the first party a token at a first time, the token including a first data set associated with authorized access to the controlled data;
receiving at the computer processor from a second party and not from the first party a request for the controlled data at a second time, the request from the second party including the token, the second time being no earlier than the first time; and
sending from the computer processor a signal such that the second party and not to the first party is provided access to the controlled data based on the token.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method comprises receiving a request from a first party for access to controlled data, and providing access to the controlled data to a second party. The first party requests access to the controlled data and a token is provided to the first party. The token includes data associated with authorized access to the controlled data. A request for access to the controlled data including the token is later received from the second party, and access to the controlled data is provided to the second party.
-
Citations
21 Claims
-
1. A method, comprising:
-
receiving by a computer processor from a first party, a request for access to controlled data; sending from the computer processor to the first party a token at a first time, the token including a first data set associated with authorized access to the controlled data; receiving at the computer processor from a second party and not from the first party a request for the controlled data at a second time, the request from the second party including the token, the second time being no earlier than the first time; and sending from the computer processor a signal such that the second party and not to the first party is provided access to the controlled data based on the token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus, comprising:
-
an interface configured to be operatively coupled to a communication network; a memory, the memory being configured to store controlled data; and a computer processor operatively coupled to the interface and the memory, the computer processor having a token module configured to receive from a first party over the communication network a request for a token associated with the controlled data, the token module configured to provide to the first party over the communication network the token at a first time, the computer processor having a data access module configured to receive from a second party and not from the first party over the communication network the token at a second time, the second time being no earlier than the first time, the data access module configured to provide to the second party and not to the first party access to the controlled data over the communication network based on the token. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method, comprising:
-
receiving at a first party from a second party a request for access to controlled data at a first time; sending from the first party to a computer processor a request for access to the controlled data at a second time, the second time being no earlier than the first time; receiving at the first party by the computer processor a token after the second time, the token including a first data set associated with authorized access to the controlled data; and sending from the first party to the second party the token and an identifier associated with a resource such that the second party is directed to the resource without being directed through the first party and the second party provides the token to the resource to access the controlled data without the token being provided to the first party, the token configured such that the resource provides to the second party access to the controlled data based on the token. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification