Persona-notitia intellection codifier
First Claim
1. A method of isolating a nature of personal user information from unauthorized devices, comprising:
- receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith;
decrypting said PIC code into association with particular personal user information including a requested social networking identity for said given user; and
providing said social networking identity for said given user to a requesting device from which said PIC code is received.
2 Assignments
0 Petitions
Accused Products
Abstract
A persona-notitia intellection codifier (P-NIC) server intelligently codifies and disburses personal user information from a user device (smartphone, laptop, etc.) to a multiplicity of designee devices. Masking Persona-Notitia Intellection Codes (a.k.a. PICs) are created that each stipulate control(s) and parametric limitation(s) for the associated one of a variety of personal user information. The Persona-Notitia Intellection Codifier (P-NIC) server rapidly produces a mask comprising a multiple bit “key” value (i.e., a persona-notitia intellection code (PIC)) that is uniquely distinguishable from every other PIC that'"'"'s ever been generated for a given user. The value of the PIC is typically many bytes in length, and associates attributes to a unique key value that describes a desired subset of all the user'"'"'s available personal user information to be unlocked by the key value (i.e., by the PIC).
752 Citations
15 Claims
-
1. A method of isolating a nature of personal user information from unauthorized devices, comprising:
-
receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith; decrypting said PIC code into association with particular personal user information including a requested social networking identity for said given user; and providing said social networking identity for said given user to a requesting device from which said PIC code is received. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of isolating a nature of personal user information from unauthorized devices, comprising:
-
receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith; decrypting said PIC code into association with isolated personal user information including a level of accuracy of device location to be reported for said given user; and providing said particular personal user information to a requesting device from which said PIC code is received.
-
-
11. A method of isolating a nature of personal user information from unauthorized devices, comprising:
-
receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith; decrypting said PIC code into association with isolated personal user information including an identity of a vehicle relating to a given user; and providing said particular personal user information to a requesting device from which said PIC code is received.
-
-
12. A method of isolating a nature of personal user information from unauthorized devices, comprising:
-
receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith; decrypting said PIC code into association with isolated personal user information including an identity of a relative of a given user; and providing said particular personal user information to a requesting device from which said PIC code is received.
-
-
13. A method of isolating a nature of personal user information from unauthorized devices, comprising:
-
receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith; decrypting said PIC code into association with isolated personal user information including an identity of a friend of a given user; and providing said particular personal user information to a requesting device from which said PIC code is received.
-
-
14. A method of isolating a nature of personal user information from unauthorized devices, comprising:
-
obtaining personal user information including a level of accuracy of device location to be reported for relating to a given user; encrypting a PIC code into a mapped association with said obtained personal user information relating to said given user, said PIC code not including any indication as to a nature of what personal user information is associated therewith; and providing said personal user information only to a requesting device that provides said encrypted PIC code.
-
-
15. A method of isolating the use of personal user information from unauthorized devices, comprising:
-
receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith; utilizing said PIC code to identify requested particular personal user information including comparing time of request to time said information is allowed to be accessed as identified by said given user; and providing said particular personal user information to a requesting device from which said PIC code is received.
-
Specification