×

USE OF PROXY SERVERS AND PSEUDONYMOUS TRANSACTIONS TO MAINTAIN INDIVIDUAL'S PRIVACY IN THE COMPETITIVE BUSINESS OF MAINTAINING PERSONAL HISTORY DATABASES

  • US 20110072142A1
  • Filed: 11/29/2010
  • Published: 03/24/2011
  • Est. Priority Date: 07/18/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method for exchange of pseudonymous personal information between two or more data storage servers or within a data storage server in which the identities of persons, associated servers and/or associated organizations with which the personal information resides is pseudonymous, comprising:

  • assigning respective unique identifications (UIDs) to persons having private data for storage;

    registering the persons with a pseudonymous proxy server as at least one of a plurality of respective user types based on the respective person'"'"'s relationship to the stored private data with associated pseudonyms for each user and sets of rules that control access to the respective person'"'"'s stored private data and pseudonyms for the respective person'"'"'s stored private data by persons registered with the pseudonymous proxy server based at least on user type;

    providing service provider identifiers to each person that identifies the respective persons to a service provider;

    transmitting a message from one of the persons to the service provider through the pseudonymous proxy server, wherein the pseudonymous proxy server receives the message and, based on the set of rules that control said one person'"'"'s access to the stored private data of a person registered with the pseudonymous proxy server, validates a relationship between said one person and the service provider and transmits the message to the service provider if the relationship between said one person and the service provider is validated; and

    said pseudonymous proxy server authorizing said one person to view the stored private data of said person or pseudonyms for said private data of said person based on said set of rules that control said one person'"'"'s access to said stored private data of said person and said pseudonyms for said private data of said person.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×