Management and security of personal information
First Claim
1. A method of managing personal information in a distributed computing environment, the method comprising:
- storing personal information at a personal information store, further comprising embedding a leak marker in the personal information for tracking subsequent transfer of the stored personal information, wherein the leak marker is associated with at least one portion of the personal information and identifiable to a personal information owner;
generating, by a computer, an access code for providing access to the personal information, wherein generating the access code to the requester of personal information from the personal information store comprises generating an access code valid for an authorized period of time;
providing the access code to a requester of personal information from the personal information store;
receiving at the personal information store a request for a portion of the personal information along with a requester access code;
when the requester access code matches the access code provided to the requester of the personal information, providing the requested portion of the personal information from the personal information store, wherein providing the requested portion of the personal information from the personal information store comprises providing the requested portion of the personal information to a transfer site, the transfer site being configured to provide the requester with a service corresponding to the requested personal information without revealing the personal information; and
when the request for the portion of the personal information is a request for financial information for a provider of the personal information, providing an encrypted key for allowing the requester of personal information to process a transaction using the encrypted key without receiving the financial information for the provider of the personal information.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer readable media are provided for managing and securing personal information. Personal information is stored in a central repository (personal information store) for a given personal information owner. As personal information is changed, the owner of the personal information may access the personal information store to update information stored therein. Access codes may be established for all personal information, and the use of the codes may be restricted by application of one or more rules or permissions applied to the information requesters. Alternatively, special access codes may be established for one or more pieces or combination of pieces of personal information data contained in the personal information store. Upon request or requirement for personal information, information requesters may be provided one or more access codes to allow the information requester to receive only that personal information for which they are authorized. Encrypted keys may be provided from the personal information store to information requesters instead of financial information or address information for a given personal information owner. Use of the encrypted address keys allows an information requester process a transaction or to contact a personal information owner without receiving actual financial information or contact information for the personal information owner.
-
Citations
19 Claims
-
1. A method of managing personal information in a distributed computing environment, the method comprising:
-
storing personal information at a personal information store, further comprising embedding a leak marker in the personal information for tracking subsequent transfer of the stored personal information, wherein the leak marker is associated with at least one portion of the personal information and identifiable to a personal information owner; generating, by a computer, an access code for providing access to the personal information, wherein generating the access code to the requester of personal information from the personal information store comprises generating an access code valid for an authorized period of time; providing the access code to a requester of personal information from the personal information store; receiving at the personal information store a request for a portion of the personal information along with a requester access code; when the requester access code matches the access code provided to the requester of the personal information, providing the requested portion of the personal information from the personal information store, wherein providing the requested portion of the personal information from the personal information store comprises providing the requested portion of the personal information to a transfer site, the transfer site being configured to provide the requester with a service corresponding to the requested personal information without revealing the personal information; and when the request for the portion of the personal information is a request for financial information for a provider of the personal information, providing an encrypted key for allowing the requester of personal information to process a transaction using the encrypted key without receiving the financial information for the provider of the personal information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of managing personal information in a distributed computing environment, the method comprising:
-
generating, by a computer, an access code for providing access to stored personal, further comprising embedding a leak marker in the personal information for tracking subsequent transfer of the stored personal information, wherein the leak marker is associated with at least one portion of the personal information and identifiable to a personal information owner; generating at least one access rule associated with the access code for providing access to at least one portion of the personal information; applying the at least one access rule to the access code for restricting access to the at least one portion of the personal information, wherein applying the at least one access rule to the access code for restricting access to the at least one portion of personal information comprises restricting access to the at least one portion of personal information for an authorized period of time; providing the access code to a requester of personal information; receiving at the personal information store a request for the at least one portion of the personal information along with a requester access code; when the requested portion of the personal information complies with the at least one applied access rule associated with the requester access code, providing, by a computing device, information corresponding to a transfer site, the transfer site being configured to provide the requester with a service associated with the requested at least one portion of the personal information without revealing the personal information to the requester; and when the request for the portion of the personal information is a request for financial information for a provider of the personal information, providing an encrypted key for allowing the requester of personal information to process a transaction using the encrypted key without receiving the financial information for the provider of the personal information. - View Dependent Claims (14, 15)
-
-
16. A computer-readable storage device on which is stored computer-executable instructions which when executed by a computer perform a method of managing personal information in a distributed computing environment, the method executed by the computer-executable instructions comprising:
-
generating an access code for providing access to stored personal information, the stored personal information having embedded a leak marker for tracing unauthorized transfers of the stored personal information, wherein the leak marker is associated with at least one portion of the personal information and identifiable to a personal information owner; generating at least one access rule associated with the access code for providing access to the at least one portion of the personal information; applying the at least one access rule to the access code for restricting access to the at least one portion of the personal information; providing the access code to a requester of personal information; receiving at the personal information store a request for the at least one portion of the personal information along with a requester access code, the portion comprising a first email address; and when the requested portion of the personal information complies with the at least one applied access rule associated with the requester access code, providing the requester with a second email address, the second email address corresponding to a transfer site configured to provide a forwarding service to the requester; and when the request for the portion of the personal information is a request for financial information for a provider of the personal information, providing an encrypted key for allowing the requester of personal information to process a transaction using the encrypted key without receiving the financial information for the provider of the personal information. - View Dependent Claims (17, 18, 19)
-
Specification