System, method, and apparatus for proximity-based authentication for managing personal data
First Claim
1. A computer program product comprising a non-transitory computer useable storage medium to store a computer readable program for proximity-based authentication for managing personal data wherein the computer readable program, when executed on a computer, causes the computer to perform operations comprising:
- receiving, at an access controller, a request for personal data from a data access device of a requesting party, wherein the personal data belongs to a personal data owner, wherein the personal data does not belong to the requesting party, wherein the data access device comprises a request transmitter to transmit the request, wherein the data access device comprises a personal data receiver to receive the personal data;
maintaining a first access level and a second access level for the personal data, wherein the first access level permits access to a first subset of the personal data and the second access level permits access to a second subset of the personal data;
determining a first location corresponding to a location of the data access device;
determining a second location corresponding to a location of an authentication device; and
transmitting the personal data to the data access device in response to determining that the first location is within a threshold distance of the second location and in response to receiving a confirmation code indicating that a personal data owner authorizes release of the personal data, wherein the confirmation code is separate and distinct from the second location data, wherein the confirmation code is input by the personal data owner.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer program product that includes a computer useable storage medium to store a computer readable program for proximity-based authentication for managing personal data that, when executed on a computer, causes the computer to perform operations. The operations include receiving a request for personal data from a data access device, determining a first location corresponding to a location of the data access device, and determining a second location corresponding to a location of an authentication device. The operations also include transmitting the personal data to the data access device if the first location is within a threshold distance of the second location.
-
Citations
13 Claims
-
1. A computer program product comprising a non-transitory computer useable storage medium to store a computer readable program for proximity-based authentication for managing personal data wherein the computer readable program, when executed on a computer, causes the computer to perform operations comprising:
-
receiving, at an access controller, a request for personal data from a data access device of a requesting party, wherein the personal data belongs to a personal data owner, wherein the personal data does not belong to the requesting party, wherein the data access device comprises a request transmitter to transmit the request, wherein the data access device comprises a personal data receiver to receive the personal data; maintaining a first access level and a second access level for the personal data, wherein the first access level permits access to a first subset of the personal data and the second access level permits access to a second subset of the personal data; determining a first location corresponding to a location of the data access device; determining a second location corresponding to a location of an authentication device; and transmitting the personal data to the data access device in response to determining that the first location is within a threshold distance of the second location and in response to receiving a confirmation code indicating that a personal data owner authorizes release of the personal data, wherein the confirmation code is separate and distinct from the second location data, wherein the confirmation code is input by the personal data owner. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for proximity-based authentication for managing personal data, the system comprising:
-
an access controller to manage access to personal data, the access controller comprising; a request receiver to receive a request for the personal data from a data access device of a requesting party, wherein the data belongs to a personal data owner, wherein the personal data does not belong to the requesting party; a first location determiner to determine a first location corresponding to a location of the data access device; a second location determiner to determine a second location corresponding to a location of an authentication device to authenticate the request for personal data; and a personal data transmitter to transmit the personal data to the data access device in response to determining that the first location is within a threshold distance of the second location and in response to receiving a confirmation code indicating that a personal data owner authorizes release of the personal data, wherein the confirmation code is separate and distinct from the second location data, wherein the confirmation code is input by the personal data owner; the data access device coupled to the access controller to access the personal data, the data access device comprising; a request transmitter to transmit the request for personal data to the access controller; and a personal data receiver to receive the personal data from the access controller; and a personal data store coupled to the access controller to store the personal data, wherein the personal data store maintains a first access level and a second access level for the personal data, wherein the first access level permits access to a first subset of the personal data and the second access level permits access to a second subset of the personal data. - View Dependent Claims (10, 11, 12, 13)
-
Specification