SYSTEM AND METHOD FOR PROVIDING LIMITED ACCESS TO DATA
First Claim
1. A computer-implemented method for providing access to data of a first party, the data stored in a computer database, comprising:
- (a) receiving information for identifying the first party;
(b) authenticating the first party using the received information for identifying the first party;
(c) generating a first read-only personal identification number (PIN);
(d) associating the first read-only PIN with a first set of access rights for the data of the first party;
(e) providing the first read-only PIN to a second party;
(f) storing the first read-only PIN with the first set of access rights in the computer database;
(g) receiving the first read-only PIN from the second party;
(h) authenticating the received first read-only PIN using the stored first read-only PIN; and
(i) providing the second party with access to at least a portion of the data of the first party using the first set of access rights associated with the first read-only PIN if the received first read-only PIN is authenticated.
5 Assignments
0 Petitions
Accused Products
Abstract
A system and computer-implemented method for providing access to data of a first party including receiving information for identifying the first party, authenticating the first party using the received information for identifying the first party and generating a first read-only personal identification number (PIN). The first read-only PIN is associated with a first set of access rights for the data of the first party and provided to a second party. The first read-only PIN is stored with the first set of access rights in a computer database. A third party receives the first read-only PIN from the second party, authenticates the received first read-only PIN using the stored first read-only PIN and provides the second party with access to at least a portion of the data of the first party using the first set of access rights associated with the first read-only PIN if the received first read-only PIN is authenticated.
16 Citations
36 Claims
-
1. A computer-implemented method for providing access to data of a first party, the data stored in a computer database, comprising:
-
(a) receiving information for identifying the first party; (b) authenticating the first party using the received information for identifying the first party; (c) generating a first read-only personal identification number (PIN); (d) associating the first read-only PIN with a first set of access rights for the data of the first party; (e) providing the first read-only PIN to a second party; (f) storing the first read-only PIN with the first set of access rights in the computer database; (g) receiving the first read-only PIN from the second party; (h) authenticating the received first read-only PIN using the stored first read-only PIN; and (i) providing the second party with access to at least a portion of the data of the first party using the first set of access rights associated with the first read-only PIN if the received first read-only PIN is authenticated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-implemented method for providing access to data of a first party, the data stored in a computer database, comprising:
-
(a) receiving information for identifying the first party; (b) authenticating the first party using the received information for identifying the first party; (c) generating at least two unique read-only personal identification numbers (PINs); (d) associating each unique read-only PIN with a unique party and a unique set of access rights for the data of the first party; (e) providing each unique read-only PIN to each associated unique party; (f) storing each unique read-only PIN with each associated unique set of access rights in the computer database; (g) receiving one of said unique read-only PINs from the unique party associated with the received unique read-only PIN; (h) authenticating the received unique read-only PIN using the stored read-only PINs; and (i) providing the unique party associated with the received unique read-only PIN with access to at least a portion of the data of the first party using the unique set of access rights associated with the unique read-only PIN if the received unique read-only PIN is authenticated. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system for providing access to data of a first party, comprising:
-
a computer processor having a computer readable storage medium, the computer readable storage medium comprising computer-executable instructions stored therein for executing on said processor, said instructions for causing said processor to; (a) receive information for identifying the first party; (b) authenticate the first party using the received information for identifying the first party; (c) generate a first read-only personal identification number (PIN); (d) associate the first read-only PIN with a first set of access rights for the data of the first party; (e) provide the first read-only PIN to a second party; (f) store the first read-only PIN with the first set of access rights; (g) receive the first read-only PIN from the second party; (h) authenticate the received first read-only PIN using the stored first read-only PIN; and (i) provide the second party with access to at least a portion of the data of the first party using the first set of access rights associated with the first read-only PIN if the received first read-only PIN is authenticated. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A computer-implemented method for providing access to data of a first party, the data stored in a computer database, comprising:
-
(a) receiving information for identifying the first party; (b) authenticating the first party using the received information for identifying the first party; (c) generating at least two unique read-only personal identification numbers (PINs); (d) associating each unique read-only PIN with a unique party and a unique set of access rights for the data of the first party; (e) providing each unique read-only PIN to each associated unique party; (f) storing each unique read-only PIN with each associated unique set of access rights in the computer database; (g) receiving a payment from a party associated with a unique set of access rights comprising payment requirements for receiving access rights to the data of the first party; (h) processing the received payment; (i) receiving a read-only PIN from the paying party; (j) authenticating the received read-only PIN using the stored read-only PINs; and (k) providing the paying party with access to at least a portion of the data of the first party using the unique set of access rights associated with the received read-only PIN if the received read-only PIN is authenticated and if the payment from the paying party is processed.
-
Specification