×

Management and security of personal information

  • US 8,806,218 B2
  • Filed: 03/18/2005
  • Issued: 08/12/2014
  • Est. Priority Date: 03/18/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of managing personal information in a distributed computing environment, the method comprising:

  • storing personal information at a personal information store, further comprising embedding a leak marker in the personal information for tracking subsequent transfer of the stored personal information, wherein the leak marker is associated with at least one portion of the personal information and identifiable to a personal information owner;

    generating, by a computer, an access code for providing access to the personal information, wherein generating the access code to the requester of personal information from the personal information store comprises generating an access code valid for an authorized period of time;

    providing the access code to a requester of personal information from the personal information store;

    receiving at the personal information store a request for a portion of the personal information along with a requester access code;

    when the requester access code matches the access code provided to the requester of the personal information, providing the requested portion of the personal information from the personal information store, wherein providing the requested portion of the personal information from the personal information store comprises providing the requested portion of the personal information to a transfer site, the transfer site being configured to provide the requester with a service corresponding to the requested personal information without revealing the personal information; and

    when the request for the portion of the personal information is a request for financial information for a provider of the personal information, providing an encrypted key for allowing the requester of personal information to process a transaction using the encrypted key without receiving the financial information for the provider of the personal information.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×