System, method, and apparatus for proximity-based authentication for managing personal data
First Claim
1. A computer implemented method for proximity-based authentication for managing personal data, the method comprising:
- receiving, at an access controller, a request for personal data from a data access device of a requesting party, wherein the personal data belongs to a personal data owner, wherein the personal data does not belong to the requesting party, wherein the data access device comprises a request transmitter to transmit the request, wherein the data access device comprises a personal data receiver to receive the personal data;
maintaining a first access level and a second access level for the personal data, wherein the first access level permits access to a first subset of the personal data and the second access level permits access to a second subset of the personal data;
accessing a data access device database associating the data access device with a first location corresponding to a location of the data access device;
receiving second location data indicating a second location corresponding to a location of an authentication device;
transmitting the first subset of the personal data to the data access device in response to determining that the second location is within a first threshold distance of the first location;
transmitting the second subset of the personal data to the data access device in response to determining that the second location is within a second threshold distance of the first location;
assigning the second access level to the received request for personal data in response to determining that the data access device is entitled to access the second subset of the personal data; and
transmitting only the second subset of the personal data and not transmitting the first subset of the personal data to the data access device in response to determining that the second location is within the second threshold distance of the first location and not within the first threshold distance of the first location and in response to receiving a confirmation code indicating that the personal data owner authorizes release of the personal data, wherein the confirmation code is separate and distinct from the second location data, wherein the confirmation code is input by the personal data owner.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer program product that includes a computer useable storage medium to store a computer readable program for proximity-based authentication for managing personal data that, when executed on a computer, causes the computer to perform operations. The operations include receiving a request for personal data from a data access device, determining a first location corresponding to a location of the data access device, and determining a second location corresponding to a location of an authentication device. The operations also include transmitting the personal data to the data access device if the first location is within a threshold distance of the second location.
24 Citations
11 Claims
-
1. A computer implemented method for proximity-based authentication for managing personal data, the method comprising:
-
receiving, at an access controller, a request for personal data from a data access device of a requesting party, wherein the personal data belongs to a personal data owner, wherein the personal data does not belong to the requesting party, wherein the data access device comprises a request transmitter to transmit the request, wherein the data access device comprises a personal data receiver to receive the personal data; maintaining a first access level and a second access level for the personal data, wherein the first access level permits access to a first subset of the personal data and the second access level permits access to a second subset of the personal data; accessing a data access device database associating the data access device with a first location corresponding to a location of the data access device; receiving second location data indicating a second location corresponding to a location of an authentication device; transmitting the first subset of the personal data to the data access device in response to determining that the second location is within a first threshold distance of the first location; transmitting the second subset of the personal data to the data access device in response to determining that the second location is within a second threshold distance of the first location; assigning the second access level to the received request for personal data in response to determining that the data access device is entitled to access the second subset of the personal data; and transmitting only the second subset of the personal data and not transmitting the first subset of the personal data to the data access device in response to determining that the second location is within the second threshold distance of the first location and not within the first threshold distance of the first location and in response to receiving a confirmation code indicating that the personal data owner authorizes release of the personal data, wherein the confirmation code is separate and distinct from the second location data, wherein the confirmation code is input by the personal data owner. - View Dependent Claims (2, 3, 8, 9, 10, 11)
-
-
4. A computer implemented method for proximity-based authentication for managing personal data, the method comprising:
-
receiving, at an access controller, a request for personal data from a data access device of a requesting party, wherein the personal data belongs to a personal data owner, wherein the personal data does not belong to the requesting party, wherein the data access device comprises a request transmitter to transmit the request, wherein the data access device comprises a personal data receiver to receive the personal data; maintaining a first access level and a second access level for the personal data, wherein the first access level permits access to a first subset of the personal data and the second access level permits access to a second subset of the personal data; determining a first location corresponding to a location of the data access device; determining a second location corresponding to a location of an authentication device; receiving a confirmation code indicating that the personal data owner authorizes release of the personal data, wherein the confirmation code is separate and distinct from the second location data, wherein the confirmation code is input by the personal data owner; and transmitting the personal data to the data access device in response to determining that the second location is within a threshold distance of the first location and in response to receiving the confirmation code. - View Dependent Claims (5, 6, 7)
-
Specification