Online repository for personal information and access of information stored therein
First Claim
1. A method for sharing a first party'"'"'s personal information with a second party authorized by the first party by transmitting the first party'"'"'s personal information from a server computer system operated by a service provider, said server computer system including a database, the method comprising the steps by the server computer system:
- establishing an account for the first party;
assigning an identifier to the first party;
receiving the first party'"'"'s personal information, said first party'"'"'s personal information comprising at least one of a plurality of information objects;
associating at least one of a plurality of security levels with each information object at any granularity, thereby enabling access to individually selected portions of the first party'"'"'s personal information by individual receiving parties;
storing in the database the first party identifier, the information object and the security level assigned to the information object;
receiving a request, said request comprising at least the first party identifier;
in response to the request, selecting a first portion of the first party'"'"'s personal information objects that could be transmitted to a second party;
retrieving from the database the selected first portion of the first party'"'"'s personal information objects;
securely transmitting the retrieved first portion of the first party'"'"'s personal information objects to the second party;
obtaining a second party identifier;
if the second party is not authorized to receive the first portion of the first party'"'"'s personal information objects, recording the second party identifier;
rejecting the second party'"'"'s request for information; and
maintaining a record of unauthorized requests for information.
1 Assignment
0 Petitions
Accused Products
Abstract
A first party'"'"'s personal information is stored in a secure online database with security levels associated at granular level. A second party'"'"'s request to access the first party'"'"'s personal information is verified and a portion of the first party'"'"'s personal information is sent to the second party based on the second party'"'"'s request meeting certain conditions or criteria.
-
Citations
20 Claims
-
1. A method for sharing a first party'"'"'s personal information with a second party authorized by the first party by transmitting the first party'"'"'s personal information from a server computer system operated by a service provider, said server computer system including a database, the method comprising the steps by the server computer system:
-
establishing an account for the first party; assigning an identifier to the first party; receiving the first party'"'"'s personal information, said first party'"'"'s personal information comprising at least one of a plurality of information objects; associating at least one of a plurality of security levels with each information object at any granularity, thereby enabling access to individually selected portions of the first party'"'"'s personal information by individual receiving parties; storing in the database the first party identifier, the information object and the security level assigned to the information object; receiving a request, said request comprising at least the first party identifier; in response to the request, selecting a first portion of the first party'"'"'s personal information objects that could be transmitted to a second party; retrieving from the database the selected first portion of the first party'"'"'s personal information objects; securely transmitting the retrieved first portion of the first party'"'"'s personal information objects to the second party; obtaining a second party identifier; if the second party is not authorized to receive the first portion of the first party'"'"'s personal information objects, recording the second party identifier; rejecting the second party'"'"'s request for information; and maintaining a record of unauthorized requests for information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A server computer system comprising:
-
one or more processors; one or more processor readable storage devices having processor readable code embodied on said one or more processor readable storage devices, the processor readable code being configured to instruct the one or more processors to; establish an account for the first party; assign an identifier to the first party; receive the first party'"'"'s personal information, said first party'"'"'s personal information comprising at least one of a plurality of information objects; associate at least one of a plurality of security levels with each information object at any granularity, thereby enabling access to individually selected portions of the first party'"'"'s personal information by individual receiving parties; store in the database the first party identifier, the information object and the security level assigned to the information object; receive a request, said request comprising at least the first party identifier; in response to the request, select a first portion of the first party'"'"'s personal information objects that could be transmitted to a second party; retrieve from the database the selected first portion of the first party'"'"'s personal information objects; securely transmit the retrieved first portion of the first party'"'"'s personal information objects to the second party; obtain a second party identifier; if the second party is not authorized to receive the first portion of the first party'"'"'s personal information objects, record the second party identifier; reject the second party'"'"'s request for information; and maintain a record of unauthorized requests for information. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification