Authentication mechanisms to enable sharing personal information via a networked computer system
First Claim
1. A method of sharing a first party'"'"'s information with a second party based on multi-factor authentication, the method comprising the following steps performed by a server computer:
- establishing an account for a first party;
storing one or more information objects in the first party'"'"'s account;
receiving a first request to access one or more information objects stored in the first party'"'"'s account from a second party, the first request accompanying a first authentication mechanism and a second authentication mechanism; and
enabling access by the second party to the one or more information objects stored in the first party'"'"'s account if the first request is authenticated under the first authentication mechanism and the second authentication mechanism, whereby the second party accesses the one or more information objects authorized by the first party.
2 Assignments
0 Petitions
Accused Products
Abstract
System, method and apparatus having the capability of using various authentication mechanisms to share a first party'"'"'s (user'"'"'s) personal information stored in a server computer connected to the Internet with a second party (requester). The authentication mechanisms may include a biometric identifier, a single-use password, an expiration time on a password, or permit a second party (requester) to access authorized portions of a first party'"'"'s (user'"'"'s) credit/debit card information or likes or dislikes or personal health information from an online database. Also disclosed is a method of providing access to a first party'"'"'s information using an authentication code that is valid for a predetermined number of access requests and attempting to access the first party'"'"'s information beyond the predetermined number raises an alarm.
88 Citations
39 Claims
-
1. A method of sharing a first party'"'"'s information with a second party based on multi-factor authentication, the method comprising the following steps performed by a server computer:
-
establishing an account for a first party; storing one or more information objects in the first party'"'"'s account; receiving a first request to access one or more information objects stored in the first party'"'"'s account from a second party, the first request accompanying a first authentication mechanism and a second authentication mechanism; and enabling access by the second party to the one or more information objects stored in the first party'"'"'s account if the first request is authenticated under the first authentication mechanism and the second authentication mechanism, whereby the second party accesses the one or more information objects authorized by the first party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A server computer system configured to share a first party'"'"'s personal information with a second party comprising:
-
a processor, a memory, the memory coupled to the processor, wherein the memory is configured to provide the processor with instructions which when executed cause the processor to; establish an account for a first party; store one or more information objects in the first party'"'"'s account; receive from a second party a first request to access one or more information objects stored in the first party'"'"'s account, said first request accompanying a first authentication mechanism and a second authentication mechanism; and enable access to the one or more information objects stored in the first party'"'"'s account if the first request is authenticated under the first authentication mechanism and the second authentication mechanism, whereby the second party accesses the one or more information objects authorized by the first party.
-
-
16. A method of using a an N-time (N, where N≧
- 1) authorization key to access a first party'"'"'s information stored in the first party'"'"'s account established on a server computer, said method comprising the following steps performed on the server computer;
receiving a request from a requester to access a first portion of the first party'"'"'s information, said request including; the requester'"'"'s identification information, the first party'"'"'s identification information; an authentication code, said authentication code being configured to be used a predetermined number (N, where N≧
1) of times to access the first portion of the first party'"'"'s information; andenabling the requester to access the first portion of the first party'"'"'s information if the number (n) of times the request is made using the authorization code does not exceed N. - View Dependent Claims (17, 18, 19, 20)
- 1) authorization key to access a first party'"'"'s information stored in the first party'"'"'s account established on a server computer, said method comprising the following steps performed on the server computer;
-
21. A non-transitory computer-readable storage medium storing program code for causing a server computer to perform a method of sharing a first party'"'"'s information with a second party based on multi-factor authentication, the method comprising the following steps performed on the server computer:
-
establishing an account for a first party; storing one or more information objects in the first party'"'"'s account; receiving a first request to access one or more information objects stored in the first party'"'"'s account from a second party, the first request accompanying a first authentication mechanism and a second authentication mechanism; and enabling access by the second party to the one or more information objects stored in the first party'"'"'s account if the first request is authenticated under the first authentication mechanism and the second authentication mechanism, whereby the second party accesses the one or more information objects authorized by the first party. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A non-transitory computer-readable storage medium storing program code for causing a server computer to perform a method of an N-time (N, where N≧
- 1) authorization key to access a first party'"'"'s information stored in the first party'"'"'s account established on a server computer, said method comprising the following steps performed on the server computer;
receiving a request from a requester to access a first portion of the first party'"'"'s information, said request including; the requester'"'"'s identification information, the first party'"'"'s identification information; an authentication code, said authentication code being configured to be used a predetermined number (N, where N≧
1) of times to access the first portion of the first party'"'"'s information; andenabling the requester to access the first portion of the first party'"'"'s information if the number (n) of times the request is made using the authorization code does not exceed N. - View Dependent Claims (36, 37, 38, 39)
- 1) authorization key to access a first party'"'"'s information stored in the first party'"'"'s account established on a server computer, said method comprising the following steps performed on the server computer;
Specification