Remote profile security system
First Claim
Patent Images
1. A method comprising:
- storing, at a server computer system, first user profile information for a remote user;
restricting access to the first user profile information for the remote user at the server computer system, the restricting access to the first user profile information for the remote user at the server computer system comprising using authentication information to encrypt user identification information;
accessing the first user profile information, at the server computer system, using the authentication information, the authentication information being selectively made available by the remote user via a network to the server computer system in order to enable the server computer system to access the first user profile information; and
restricting access to the first remote user profile information using the authentication information subsequent to an interaction session between the remote user of the server computer system and removing the authentication information from the server computer system subsequent to the encryption of the first remote user profile information.
2 Assignments
0 Petitions
Accused Products
Abstract
A method comprises storing, at the server computer system, user profile information for the remote user. The user profile information for the remote user (or a link to the user profile information) is encrypted using authentication information. The user profile information is associated with user identification information, at the server computer system, using the authentication information, which is selectively made available by the remote user via the network to the server computer system in order to enable the server computer system to associate the user profile information with the user identification information.
-
Citations
33 Claims
-
1. A method comprising:
-
storing, at a server computer system, first user profile information for a remote user; restricting access to the first user profile information for the remote user at the server computer system, the restricting access to the first user profile information for the remote user at the server computer system comprising using authentication information to encrypt user identification information; accessing the first user profile information, at the server computer system, using the authentication information, the authentication information being selectively made available by the remote user via a network to the server computer system in order to enable the server computer system to access the first user profile information; and restricting access to the first remote user profile information using the authentication information subsequent to an interaction session between the remote user of the server computer system and removing the authentication information from the server computer system subsequent to the encryption of the first remote user profile information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
a data store, accessible by a server computer system, to store first remote user profile information for a remote user; and an access component of the server computer system to associate the first remote user profile information with identification information of the remote user using a key, the key being selectively made available by the remote user to the access component in order to enable the association of the first remote user profile information with identification information of the remote user, the access component further to encrypt the first remote user profile information using the key subsequent to an interaction session between the remote user of the server computer system, and to expunge the key from the server computer system subsequent to the encryption of the first remote user profile information. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. One or more machine-readable hardware storage device embodying instructions that, when executed by a server computer system, cause the server computer system to perform a method comprising:
-
storing, at the server computer system, first user profile information for a remote user; restricting access to the first user profile information for the remote user at the server computer system, the restricting of the access to the first user profile information at the server computer system comprising using authentication information for encrypting remote user identification; and accessing the first user profile information, at the server computer system, using the authentication information, the authentication information being selectively made available by the remote user via a network to the server computer system in order to enable the server computer system to access the first user profile information; and restricting access to the first remote user profile information using the authentication information subsequent to an interaction session between the first remote user of the server computer system and removing the authentication information from the server computer system subsequent to the encryption of the first remote user profile information.
-
-
31. A method comprising:
-
storing, at a server computer system, first user profile information for a remote user; restricting access to the first user profile information for the remote user at the server computer system using authentication information, the restricting access to the first user profile information for the remote user at the server computer system comprising encrypting remote user identification information; accessing the first user profile information, at the server computer system, using the authentication information, the authentication information being selectively made available by the remote user via a network to the server computer system in order to enable the server computer system to access the first user profile information; and restricting access to the first remote user profile information using the authentication information subsequent to an interaction session between the first remote user of the server computer system and removing the authentication information from the server computer system subsequent to the encryption of the first remote user profile information.
-
-
32. A method comprising:
-
storing, in a first table of a relational database at a server computer system, unrestricted identification information for a remote user; storing, in a second table, restricted profile information for the remote user; using the unrestricted identification information for the remote user as an index to associate the stored unrestricted identification information with the stored restricted profile information; restricting access to the restricted profile information for the remote user at the server computer system using authentication information, the restricting access to the restricted profile information for the remote user at the server computer system comprising encrypting the unrestricted identification information; accessing the restricted profile information, at the server computer system, using the authentication information, the authentication information being selectively made available by the remote user via a network to the server computer system in order to enable the server computer system to access the restricted profile information; and restricting access to the unrestricted profile information using the authentication information subsequent to an interaction session between the first remote user of the server computer system and removing the authentication information from the server computer system subsequent to the encryption of the unrestricted profile information.
-
-
33. A hardware machine-readable storage device having embedded therein a
set of instructions which, when executed by the machine, causes the machine to execute the operations comprising: -
storing in a first table unrestricted identification information for a remote user; storing, in a second table, restricted profile information for the remote user; using the unrestricted identification information for the remote user as an index to associate the stored unrestricted identification information with the stored restricted profile information; restricting access to the restricted profile information for the remote user using authentication information, the restricting access to the restricted profile information for the remote user comprising encrypting the unrestricted identification information for the remote user that associates the restricted profile information with the unrestricted identification information; accessing the restricted profile information using the authentication information, the authentication information being selectively made available by the remote user via a network to the server computer system in order to enable the server computer system to access the restricted profile information; and restricting access to the unrestricted profile information using the authentication information subsequent to an interaction session between the first remote user of the server computer system and removing the authentication information from the server computer system subsequent to the encryption of the unrestricted profile information.
-
Specification