Management of private information
First Claim
Patent Images
1. A method comprising:
- receiving, by a network device and from a server device, a request for private information, associated with a user of a user device,the request originating from another user device;
authenticating, by the network device, the server device associated with the request for private information, based on receiving the request,the authenticating the server device including authenticating that a party associated with the server device has agreed to a network provider'"'"'s terms of use regarding the party'"'"'s use of private information associated with the user of the user device;
authenticating, by the network device, that the user device is registered with the network provider that provides service to the user device, based on receiving the request;
authenticating, by the network device, that the other user device is authorized to receive the private information, based on receiving the request;
sending, by the network device, a message to the user device requesting authorization to send the private information to the server device, based on results of authenticating the server device, authenticating the user device, and authenticating the other user device;
receiving, by the network device, authorization from the user device to send the private information to the server device;
generating, by the network device, a token used to request the private information, based on receiving the authorization;
sending, by the network device, the token to the server device;
receiving, by the network device, the token from the server device,the server device using the token to request the private information associated with the user; and
sending, by the network device, the private information to the server device, based on receiving the token.
1 Assignment
0 Petitions
Accused Products
Abstract
A network device is configured to receive a request, from a device, for private information associated with a user of a user device, on behalf of another user device. The network device may authenticate the device, the user device, and the other user device. The network device may request and receive the user'"'"'s authorization to send the private information to the other user device. The network device may generate and send a token used to request the private information. The network device may receive the token from the device, determine that the token is valid, and send the private information.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by a network device and from a server device, a request for private information, associated with a user of a user device, the request originating from another user device; authenticating, by the network device, the server device associated with the request for private information, based on receiving the request, the authenticating the server device including authenticating that a party associated with the server device has agreed to a network provider'"'"'s terms of use regarding the party'"'"'s use of private information associated with the user of the user device; authenticating, by the network device, that the user device is registered with the network provider that provides service to the user device, based on receiving the request; authenticating, by the network device, that the other user device is authorized to receive the private information, based on receiving the request; sending, by the network device, a message to the user device requesting authorization to send the private information to the server device, based on results of authenticating the server device, authenticating the user device, and authenticating the other user device; receiving, by the network device, authorization from the user device to send the private information to the server device; generating, by the network device, a token used to request the private information, based on receiving the authorization; sending, by the network device, the token to the server device; receiving, by the network device, the token from the server device, the server device using the token to request the private information associated with the user; and sending, by the network device, the private information to the server device, based on receiving the token. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
a network device to; receive a request, from a server device, for private information, associated with a user of a user device, the server device providing the request on behalf of another user device; authenticate, based on receiving the request, that the server device is associated with the request for private information, the authenticating including authenticating that a party associated with the server device has agreed to a network provider'"'"'s terms of use regarding the party'"'"'s use of private information associated with the user of the user device based on receiving the request; authenticate that the user device is registered with the network provider, based on receiving the request; authenticate that the other user device is allowed to receive the private information, the other user device executing an application associated with the party that agreed to the network provider'"'"'s terms of use; send a message, to the user device, requesting authorization to send the private information to the other user device, based on results of authenticating the server device, authenticating the user device, and authenticating the other user device; receive, from the user device, the authorization to send the private information to the other user device, the authorization including how the private information can be used by the other user device; generate a token used to request the private information, based on receiving the authorization; send the token to the server device; receive the token from the server device, the server device using the token to request the private information; determine that the token is valid to request the private information; and send the private information to the server device, based on determining that the token is valid. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
14. A computer-readable medium comprising:
a plurality of instructions, that when executed by one or more processors of one or more network devices, cause the one or more processors to; receive information associated with an agreement to provide private information associated with a user device, the agreement including a condition that the private information is to be sent to a server device; store the information associated with the agreement; receive a request to receive private information, associated with the user device, from the server device, based on the agreement; authenticate that the server device is associated with the request for private information, based on receiving the request, the authenticating including authenticating that a party associated with the server device has agreed to a network provider'"'"'s terms of use regarding the party'"'"'s use of private information associated with the user of the user device based on receiving the request; authenticate that the user device is registered with a network, based on receiving the request; authenticate that another user device is allowed to receive the private information from the server device, based on a relationship between the other user device and the server device; send an authorization request, based on results of authenticating the server device, authenticating the user device, and authenticating the other user device; receive authorization to send the private information to the server device; generate a token, based on receiving the authorization; and send the token to the server device, the server device using the token to request the private information associated with the user device. - View Dependent Claims (15, 16, 17, 18, 19, 20)
Specification