Systems and methods for authorization of information access
First Claim
1. A method for approving access to or use of personal information correlated to a governmentally issued identifier, said method comprising the steps of:
- receiving, through an internet capable device, an unsolicited verification communication from a verification system;
using said internet capable device to transmit a variable static client identifier to said verification system;
using said internet capable device to transmit a dynamic client identifier to said verification system; and
using said internet capable device to transmit a subscriber verification response to said verification system,said verification communication being received at a communication address, said address having been provided to said verification system by a person directly correlated with said governmentally issued identifier,wherein said subscriber verification response indicates an approval or denial of permission for a third party to access or use said personal information, and said third party is different from said verification system.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods according to the present invention provide a proactive approach to controlling access to information that may be correlated with a governmentally issued personal identifier. Included are systems and methods for proactive control of information access and liability incursion. Further included are systems and methods for emulating information access to an authorized person. Generally, a method according to the present invention includes the steps of requesting verification from a subscriber at any time that information is requested from registered information holders and any time that liability may be incurred through registered information holders. In this way, the subscriber, rather than reacting to invasive information or identity theft, may proactively control access to such information, thereby preventing the theft in the first place.
96 Citations
34 Claims
-
1. A method for approving access to or use of personal information correlated to a governmentally issued identifier, said method comprising the steps of:
-
receiving, through an internet capable device, an unsolicited verification communication from a verification system; using said internet capable device to transmit a variable static client identifier to said verification system; using said internet capable device to transmit a dynamic client identifier to said verification system; and using said internet capable device to transmit a subscriber verification response to said verification system, said verification communication being received at a communication address, said address having been provided to said verification system by a person directly correlated with said governmentally issued identifier, wherein said subscriber verification response indicates an approval or denial of permission for a third party to access or use said personal information, and said third party is different from said verification system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for verifying access to personal information correlated to a governmentally issued identifier, said method comprising the steps of:
-
at a verification system including an internet server, receiving a system verification request from a first party holding said personal information, wherein said verification request was prompted by a request from a second party; using said verification system to initiate a verification communication to a third party that controls permission to access said personal information, wherein said first party, said second party, and said third party are different from each other; receiving a variable static client identifier; receiving a dynamic client identifier; receiving a subscriber verification response; waiting until the expiry of a response time, wherein said expiry of said response time is caused by one of an elapse of a predetermined period of time and said receiving of said subscriber verification response; and after said waiting step, using said verification system to reply to said system verification request with a system verification response wherein said system verification response indicates an approval or denial of permission by said third party for said second party to access or use said personal information. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A system comprising:
-
a web server; a database accessible by said web server, said database correlating the following with a client; a static client identifier, a variable static client identifier, a unique dynamic identification device identifier consisting of a serial number associated with a physical dynamic identification device, a client password, a static answer to a security question, at least one uniform resource locator (URL) with a correlated site user name and site user password, a governmentally issued identifier and at least one communication address; a communications server communicatively coupled to said web server and configured to transmit an unsolicited subscriber verification request to at least one communication address; wherein said system is configured to receive a response variable static client identifier, a response dynamic client identifier, and a subscriber verification response in response to said subscriber verification request, and further wherein at least a portion of said system is programmed to compare said variable static identifier to said response variable static client identifier.
-
Specification