Methods and apparatus related to transmission of confidential information to a relying entity
First Claim
Patent Images
1. A non-transitory processor-readable medium storing code representing instructions that when executed by a processor cause the processor to:
- define a domain of confidential information associated with a subject entity based on a confidential information category selected from a plurality of confidential information categories by a relying entity at a first device;
provide, to the relying entity and from an information provider implemented at a second device different from the first device, a set of predefined queries associated with the domain of confidential information, the set of predefined queries being different from the plurality of confidential information categories and being approved by the subject entity at a third device different from the first device and the second device; and
define at least a portion of a request for confidential information from the domain of confidential information based on at least one predefined query selected from the set of predefined queries by the relying entity.
0 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes defining a request for confidential information from a domain of confidential information based on an input from a relying entity. The domain of confidential information can be associated with a subject entity. A response to the request can be defined at an information provider. The method can also include sending the response to the relying entity when the response has been approved by the subject entity.
-
Citations
35 Claims
-
1. A non-transitory processor-readable medium storing code representing instructions that when executed by a processor cause the processor to:
-
define a domain of confidential information associated with a subject entity based on a confidential information category selected from a plurality of confidential information categories by a relying entity at a first device; provide, to the relying entity and from an information provider implemented at a second device different from the first device, a set of predefined queries associated with the domain of confidential information, the set of predefined queries being different from the plurality of confidential information categories and being approved by the subject entity at a third device different from the first device and the second device; and define at least a portion of a request for confidential information from the domain of confidential information based on at least one predefined query selected from the set of predefined queries by the relying entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method implemented in a memory or a processing device, comprising:
-
receiving, at an information provider implemented in at least one of a memory or a processing device, a trust-level value and an entity-type value associated with a relying entity; determining, based on the trust-level value and the entity-type value, that the relying entity has authorization to request confidential information from a domain of confidential information, the domain of confidential information defining a subset of confidential information from a set of confidential information associated with a subject entity, the information provider being controlled by a third party different from the relying entity and the subject entity; and defining, at the information provider, at least a portion of a request for confidential information from the subset of confidential information based on predefined query selected (1) by the relying entity at a first device and (2) from a plurality of predefined queries approved by the subject entity at a second device different from the first device, each predefined query from the plurality of predefined queries configured to elicit confidential information from the subset of confidential information. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. A method comprising:
-
receiving, from a first device associated with a subject entity and at an information provider implemented in at least one of a memory or a processor of a second device different from the first device, a response policy associated with disclosure of confidential information of the subject entity; determining, based on the response policy, that a relying entity has authorization to request confidential information from a domain of confidential information associated with the subject entity; providing, based on the response policy, a plurality of predefined queries associated with the domain of confidential information to a third device (1) associated with the relying entity and (2) different from the first device and the second device, the domain of confidential information being associated with the subject entity, each predefined query from the plurality of predefined queries being approved by the subject entity and configured to elicit confidential information from the domain of confidential information; and defining at least a portion of a request for confidential information from the domain of confidential information based on a predefined query when the predefined query is selected from the plurality of predefined queries by the relying entity. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A method, comprising:
-
defining a request for confidential information from a domain of confidential information based on an input from a relying entity at a first device, the domain of confidential information being associated with a subject entity; defining a response to the request at an information provider at a second device different from the first device; and sending, via a communication network, the response to the relying entity when the response has been approved, subsequent to the defining the request, by the subject entity at a third device different from the first device and the second device. - View Dependent Claims (27, 28, 29, 30)
-
-
31. A method, comprising:
-
defining, at an information provider implemented in at least one of a memory or a processor of a first device, a proposed response to a predefined query selected by a relying entity at a second device different from the first device, the proposed response being defined based on confidential information associated with an individual, the information provider being controlled by a third-party different from the relying entity and the individual; authenticating an identity of the individual; and sending, via a communication network, the proposed response to the relying entity in response to the proposed response being approved by the individual subsequent to the defining and based on the authenticating. - View Dependent Claims (32, 33, 34, 35)
-
Specification