×

System, method, and apparatus for proximity-based authentication for managing personal data

  • US 8,693,990 B2
  • Filed: 03/12/2012
  • Issued: 04/08/2014
  • Est. Priority Date: 06/16/2009
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer implemented method for proximity-based authentication for managing personal data, the method comprising:

  • receiving, at an access controller, a request for personal data from a data access device of a requesting party, wherein the personal data belongs to a personal data owner, wherein the personal data does not belong to the requesting party, wherein the data access device comprises a request transmitter to transmit the request, wherein the data access device comprises a personal data receiver to receive the personal data;

    maintaining a first access level and a second access level for the personal data, wherein the first access level permits access to a first subset of the personal data and the second access level permits access to a second subset of the personal data;

    accessing a data access device database associating the data access device with a first location corresponding to a location of the data access device;

    receiving second location data indicating a second location corresponding to a location of an authentication device;

    transmitting the first subset of the personal data to the data access device in response to determining that the second location is within a first threshold distance of the first location;

    transmitting the second subset of the personal data to the data access device in response to determining that the second location is within a second threshold distance of the first location;

    assigning the second access level to the received request for personal data in response to determining that the data access device is entitled to access the second subset of the personal data; and

    transmitting only the second subset of the personal data and not transmitting the first subset of the personal data to the data access device in response to determining that the second location is within the second threshold distance of the first location and not within the first threshold distance of the first location and in response to receiving a confirmation code indicating that the personal data owner authorizes release of the personal data, wherein the confirmation code is separate and distinct from the second location data, wherein the confirmation code is input by the personal data owner.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×