Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUS20050065950 A1
Publication typeApplication
Application numberUS 10/987,917
Publication dateMar 24, 2005
Filing dateNov 12, 2004
Priority dateJan 7, 2000
Also published asUS6845448, US8589440, US9349021
Publication number10987917, 987917, US 2005/0065950 A1, US 2005/065950 A1, US 20050065950 A1, US 20050065950A1, US 2005065950 A1, US 2005065950A1, US-A1-20050065950, US-A1-2005065950, US2005/0065950A1, US2005/065950A1, US20050065950 A1, US20050065950A1, US2005065950 A1, US2005065950A1
InventorsNaren Chaganti, Sitapathi Chaganti, Damayanti Chaganti
Original AssigneeNaren Chaganti, Chaganti Sitapathi Rao, Damayanti Chaganti
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Online repository for personal information
US 20050065950 A1
Abstract
A method and system for securely storing and disbursing a first party's personal information to authorized requesters is described. Each information object is assigned a security classification level. When a second party requests information, based on the second party's status, an authorized portion of the first party's personal information is released to the second party. Changes to the first party's personal information are transmitted to designated entities. Also described is a method whereby changes are effective at a future date and information as to when the changes would be effective may be transmitted to designated entities.
Images(5)
Previous page
Next page
Claims(13)
1. A method of selectively disbursing a first party's personal information, the method comprising the steps of:
storing the first party's information on a server computer, the first party's personal information comprising a plurality of information objects;
assigning a first classification to a first information object;
assigning a second classification to a second information object; and
assigning a third classification to a third information object.
2. The method of claim 1 further comprising the step of:
permitting a second party to access the second information object but not the first information object.
3. The method of claim 1 further comprising the step of:
designating a first list of persons or entities permitted to access the second information object but not the first information object.
4. The method of claim 1 further comprising the step of:
responsive to a request from a browser program running on a client computer, permitting selective access to the first party's personal information.
5. The method of claim 1 further comprising the step of:
receiving a request via a packet switched network; and
permitting selective access to the first party's information.
6. The method of claim 1 further comprising the step of:
recording every access of the first party's information to form an audit trait.
7. A method of permitting selective access to a first party's personal information, the method comprising the steps of:
storing the first party's personal information, the first party's personal information comprising a plurality of information objects;
assigning at least one of a plurality of security levels to each information object; and
transmitting a selected portion of the first party's personal information to a second party.
8. The method of claim 7, further comprising the step of:
receiving a request from a second party, said request from the second party identifying the first party.
9. The method of claim 7, further comprising the step of:
presenting an authorization to access a portion of the first party's personal information.
10. A method of notifying changes to a first party's personal information comprising the steps of:
changing the first party's information;
designating an entity to receive changed first party's information; and
notifying the designated entity of the changed first party's information.
11. The method of claim 10, wherein notifying step includes the step of:
transmitting to the designated entity changes to the first party's information.
12. The method of claim 10, wherein the notifying step includes the step of:
transmitting to the designated entity an indication of a change to the first party's information.
13. The method of claim 10, further comprising the step of:
recording an effective date for a change to the first party's personal information.
Description
    FIELD OF THE INVENTION
  • [0001]
    This invention is related in general to electronic information repositories, and in particular, to a system and method for gathering, storing and disbursing personal information to authorized entities via a communication network.
  • BACKGROUND
  • [0002]
    Entities that do businesses on the Internet frequently request visitors to their sites to fill out forms with demographic and other information. Web sites such as the New York Times web site (www.nytimes.com) that provide free access to news, sites such as the Adobe Corporation web site (www.adobe.com) that provide free downloadable software, sites that provide free magazine subscriptions, sites that provide free or paid services such as a free e-mail account, free Internet access, and similar others, ask a user to fill out a form that includes a user name, contact information, and the like. In some cases the forms are so lengthy that repeated requests for such information causes an annoyance to a user, who would rather get the information or download the software than take the time to fill out a lengthy form. The providers of these forms, however, would like to have as much information about the user as possible, so that they could obtain a profile of the type of persons that are interested in their products or services. It would be useful to both the user and the provider if the user can store all his information at a single location and authorize the release of such information to any person or entity.
  • [0003]
    Some other examples of entities that request such personal information include credit verification agencies acting on behalf of lenders, utility companies, landlords and the like; and information gathering entities such as health insurance companies, doctor's/dentist's offices, consumer or product surveys, and magazine subscriptions.
  • [0004]
    With the ubiquity of the public computer networks, commonly known as the Internet or the web, a new way of disseminating personal information has become possible. The meteoric rise of the Internet has enabled it to become a key application development plat form. Notwithstanding the availability of these information networks, there is currently no method whereby a user can enter and store his personal information at a single location and selectively authorize it to be distributed to a number of entities. Therefore, there is a need for such as system and method.
  • [0005]
    Additionally, there is no method whereby the user can update or make changes to the personal information stored at the single location—whether it is a single server computer or a collection of server computers comprising a distributed system—and cause the changes to be distributed to all persons or entities that need to be notified. Accordingly, there is a need for such a system and method.
  • [0006]
    Further, there is a need for a system which allows a classification of information according to a security or other hierarchical class structure, and provide the classified information to only those entities that have a need to know or are authorized by a person who owns the information. Moreover, there is a need for blocking unauthorized access to such personal information, while allowing access by authorized persons with ease.
  • [0007]
    Old methods of collecting and disbursing personal credit information required credit reporting agencies to gather and disburse information about individuals and companies, and to disburse this information to entities that request such information. In general, such disbursement is performed after an individual authorizes the release of such information. While these companies gather credit information from several sources, they often provide incomplete or inaccurate information that is not verified by the user until a later date. Additionally, routine form-filling, designating personal preferences such as the user's likes and dislikes, providing finger-print, retina scan, DNA sequences and other biometric information for later use, or responding to a survey or a health questionnaire is not performed by these credit reporting agencies. These problems with the existing methods can be alleviated by the presented invention as described in the following.
  • SUMMARY
  • [0008]
    The present invention is directed toward a method and system for gathering, storing personal information on a server computer and releasing such information to authorized requesters. Several types of information are stored for release to different entities with appropriate authorization.
  • [0009]
    In one aspect, the present invention is directed toward a method of for automatically disbursing personal information belonging to a user to a requester that is authorized by the user by transmitting said personal information from a server computer operated by a service provider, said server computer coupled to a database, the method comprising the steps of establishing an account for the user with the server computer; assigning an identifier to the user: entering personal information belonging to the user, said personal information comprising at least one of a plurality of information objects; assigning at least one of a plurality of security levels to each information object; storing in the database the user identifier, the information object and the security level assigned to the information object; receiving a request message from the requester, said request message comprising at least the user identifier; retrieving from the database the information object pertaining to the user identifier; securely transmitting the information object to the requester. In a further aspect, the invention comprises the steps of presenting an authorization by the requester; and verifying the requester's authorization.
  • [0010]
    Further, any modifications, updates, or changes are automatically notified to any authorized requesters. The requester optionally provides information about to whom and where to notify changes, such as address changes. Such change notification can be made by sending a notification to an electronic mail box. In a preferred embodiment, a frequent unauthorized requester of information can be tagged as “junk” requester, to whom no further information will be released.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • [0011]
    These and other objects, features and advantages of the present invention will be more readily understood in the following detailed description of the preferred embodiments and the appended claims with a reference to the drawings, where like numbers indicate like parts in the several views shown, and in which:
  • [0012]
    FIG. 1 depicts an architecture comprising a server computer 100, a user computer 104 and a requester computer 106 communicatively coupled to a communication network 102;
  • [0013]
    FIG. 2 is a flow chart of steps included in a preferred embodiment; and
  • [0014]
    FIG. 3 is an illustrative web page for a user enrollment.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • [0015]
    Referring to FIG. 1, a server computer 100 configured in accordance with the principles of the present invention is communicatively coupled to a communication network 102 such as the Internet. Also coupled to the communication network 102 is a user 103 operating a user computer 104 and a requester 105 operating a requester computer 106.
  • [0016]
    The server computer 100 illustratively comprises a microprocessor such as a Compaq® Alpha™ microprocessor, a disk drive, a memory such as a semiconductor memory, and runs an operating system such as Windows-NT™ or Linux. The server computer 100 is additionally equipped with a data communications device such as a 3-COM™ network card to connect to the network 102. In general, the connection to the network 102 can be established via an Internet Service Provider (ISP) or a direct connection. In a preferred embodiment, the server computer 100 is connected to the network 102 via a high-speed connection such as Digital Subscriber Line.
  • [0017]
    The server computer 100 is configured to function as a web server. The web server is typically a general purpose computer such as the server computer running software to interlace with the Internet using sockets. Commercial suppliers such as Netscape® Corporation of Sunnyvile, Calif. make available such web server software. Additionally, such web server software can also be downloaded and configured free of charge from some sources such as Apache.
  • [0018]
    Additional programs such as Common Gateway Interface (CGI) programs 107 reside on the server computer. The CGI programs 106 provide for communication and interaction between a user computer 104 and the server computer 100 via the network 102. These CGI programs 107, coupled with data communications software programs, are configured to receive packets of messages from computers connected to the network 102, decipher the information in the packets, and act according to instructions provided in the packets within the constraints imposed by an administrator managing the server computer 100.
  • [0019]
    In addition to performing the tasks of receiving and sending packets of data from and to the computers connected to the Internet, the CGI programs 107 are configured to perform other tasks such as communicate with a database 108 coupled to the server computer 100, and extract or store information in the database 108 according to the software instructions provided within the server computer 100 or in the packets received from the network 102. Persons skilled in the all can program these CGI programs 107 using programming tools and languages such as C, C++, Java, Perl and Shell scripts.
  • [0020]
    In an embodiment of the invention, the database 108 comprises a relational database management system, preferably, but not necessarily, with software code to enable Java Database Connectivity. Examples of such products include those marketed by the Oracle Corporation of Sunnyvale, Calif. It should additionally be noted that in an alternative embodiment the database 108 is not needed, or it could comprise software programs executing on the server computer 100.
  • [0021]
    The server computer 100 is configured to receive request messages from the user computer 104 over the internet in the Hyper Text Transfer Protocol (HTTP), File Transfer Protocol (FTP) or any similar protocol used to transfer data, video, voice or a combination of these media. After analyzing the request messages, the server computer 100 is configured to transmit in response messages that include “web pages” that are programmed in Hyper Text Markup Language (HTML) or a similar language.
  • [0022]
    Embedded in these web pages are components such as documents, scripts, objects, and flames that are configured to display colorful graphical images on a display device coupled to the user computer 104. Persons skilled in the alt know how to make web pages using programming languages or tools such as HTML, Cold Fusion™, Java®, Java Script™, Active Server Pages™, Dynamic HTML, the various markup languages such as Extensible Markup Language (XML), and similar others.
  • [0023]
    The user computer 104 is equipped with suitable devices and programs to connect to the network 102. In alternative embodiments, the user computer 104 is other device capable of establishing a communication in conjunction with other similar or dissimilar devices over a communication network such as the network 102. Examples of other commercially available digital interactive devices that are contemplated to function in place of the user computer 104 include a telephone, a WebTV™ device marketed by Microsoft Corporation of Redmond, Wash., a Palm Pilot™ device marketed by 3-COM Corporation of Santa Clara, Calif., or other similar device; the device used in conjunction with the Wireless Web™ service from the Sprint Corporation of Westwood, Kans.; or a Wireless Access Protocol (WAP)-enabled device such as the device marketed by @Motion.com used in conjunction with Wireless Internet service provided by companies such as Phone.com and supported by protocols such as Wireless Markup Language, Mobile Phone Markup Language. Such compatible wireless handset devices ale manufactured by Nokia, Motorola, Ericsson, and other companies.
  • [0024]
    In one embodiment, the user computer 104 is a digital interactive device such as a personal computer comprising a processor similar to a Pentium-III® microprocessor, a display device such as a flat panel display or a CRT, a memory such as semiconductor memory, a storage device such as a disk drive, an input device such as a keyboard, and a pointing device such as a mouse. In other embodiments, there could be provided a microphone or other speech input device and a voice or speech recognizer coupled to the user computer 104, whereupon a user 103 could provide input to the user computer 104 using spoken word commands. Currently, several commercial products are available—either hardware or software or a combination of both—that could be configured to perform speech or voice recognition of spoken words to perform several navigational functions with respect to the web. An example is the product Dragon Dictatc™ marketed by Dragon Systems, Inc. of Newton, Mass. In the following, the word “selection” includes clicking a mouse or other pointing device coupled to the user computer 104 at least once; typing at least one character on a keyboard; allowing for a timer to expire; speaking at least one voice command into a microphone coupled to the user computer 104; or touching at least one area on a touch-sensitive screen and other equivalent methods.
  • [0025]
    In the embodiments described below, a user 103 can navigate the network 102 using either a graphical or a text-based navigational software. Additionally, in a preferred embodiment, the user computer 104 is configured to navigate the network 102 via a browser such as Internet Explorer™ marketed by Microsoft Corporation of Redmond, Wash. Opera™, available at www.opera.com, is a browser configured to enable viewing XML documents. Other browsers such as virtual reality browsers can be used to obtain a three-dimensional experience of the network 102. An example of a text-based browser can be found in the software program Lynx, which is available free of charge.
  • [0026]
    The requester computer 106 comprises a processor such as a Pentium III microprocessor, a memory such as semiconductor memory, a storage device such as a hard drive, and optionally, a display device such as a CRT or an LCD display, a communications interface device such as a network card to enable connection to the network 102 either directly or via an Internet Service Provider. In alternative embodiments, the requester computer 106 could be a Java Chip enabled terminal device such as a printer directly coupled to the Internet using a protocol such as the Internet Printing Protocol, so that information objects could be directly downloaded and printed on the printer upon transmission by the server computer 100. Preferably, in such cases, there is equipped in the requester computer 106 additional software such as a handshake protocol to ensure a safe delivery of information objects.
  • [0027]
    In a preferred embodiment, the invention described herein is implemented principally on the server computer 100 and the user 103 interacts with the server computer 100 via a browser program executing on the user computer 104. Similarly, the requester 105 also interacts with the server computer 100 via the requester computer 106.
  • I. Gathering, Updating and Storing Personal Information
  • [0028]
    Referring to FIG. 2, the steps included in a preferred embodiment of the invented system are described. During an initialization step (step 200), in a preferred embodiment, a Personal Information Repository Service Provider (PIRSP) operates the server computer 100. In alternative embodiments, there is no service provider such as the PIRSP; and there are other methods of providing such service, such as establishing a personal web site for each user 103, said personal web site comprising information that can be accessed only by an authorized requester 105 in a secure manner; establishing a personal database coupled either directly to the Internet or accessible via the Internet or other communication network; or retrieving information stored elsewhere manually or in an automatic fashion.
  • [0029]
    Preferably, the PIRSP makes it known to a user 103 that it provides a trusted information repository service. In preferred and alternative embodiments, the PIRSP announces that its services ale available free, or for a fee, and in the latter case, the fee is calculated based on a per transaction basis, or on a subscription basis, either from users that store information or from entities that request such information. Other embodiments comprise direct or vicarious payment methods for utilizing the services provided by the PIRSP. These payment methods include an agreement between the PIRSP and the user 103 to generate additional or alternative sources of revenue for the PIRSP via advertisements, referrals, introductions, chain marketing methods and the like.
  • [0030]
    In this application, any piece of information, however small in granularity or however agglomerated, is referred to as an “information object.” Information objects can be implemented in an object-oriented manner, for example, each tuple or a field could be implemented as an object, a data structure or in any other manner known to persons skilled in the art.
  • Configuring the Database
  • [0031]
    In a preferred embodiment, the database 108 is a distributed database comprising several components (not shown) such as transaction manager, concurrency controller, memory manager, or a query optimizer. The database 108 is distributed over a large geographical area at several nodes, preferably by partitioning the tables and/or the tuples according to the needs of either the requesters or of the users in each node. The tables or the tuples can be partitioned either vertically or horizontally to enable fast and easy local access. In alternative embodiments, the database 108 is located at a single place.
  • [0032]
    In the following, a relational database model comprising sets of tuples, meta-data definitions for the tuples, and for other parts of the database organizational schema are described. It should be noted, however, that while a relational database model is described in the preferred embodiment, in alternative embodiments other methods of data definition, which are known to persons skilled in the art, are used. Preferably, the database 108 is configured to comprise a set of relations among several pieces of the user's personal information. These relations are shown in the following as tables according to the following schema. The schema for these tables can be designed by persons skilled in the art.
  • [0033]
    It should be noted that the user's social security number or alias can illustratively be used as primary keys to access the information from the tables. Other methods, such as date of birth, mother's maiden name, finger print scan, retina scan, or a combination of these methods can be used in other embodiments. The types of fields used in the illustration include Number [0-9]; Character [A-Za-z0-9 and other special characters such as ASCII characters]; and multimedia methods of storage for other types of data.
    TABLE 1
    Name and Address
    Field Name Field Type Field Length
    First Name Character 16
    Last Name Character 16
    Middle Name/Initial Character 10
    Office Address Character 22
    Work Phone Number 10
    Mobile Phone Number 10
    Social Security Number* Number 9
    Mother's Maiden Name* Character 16
  • [0034]
    TABLE 2
    Identity and Security
    Identity type Field Type Field Length
    Social Security Number* Number 9
    Mother's Maiden Name* Character 16
    Password Character 16
    Password reminder string Character 22
    E-mail Address Character 22
  • [0035]
    The asterisk (*) indicates that the fields could form a primary key to the table. In a preferred embodiment, each field in each tuple is assigned a security classification, the details of which will be discussed below with reference to security. Referential integrity and Entity integrity of the information objects stored in these tables is preferably ensured. Tables can be joined according to well-known techniques such as inner and outer joins. Views on tables can be formed by combining information objects from several tables. The tables, once formed are preferably normalized to make an efficient usage of the space.
  • [0036]
    Other tables, the schema for which are not described, are established to store information such as user's contact information (comprising home and work address, telephone and facsimile numbers, address of a nearest relative in case of an emergency, personal web home page address, personal web bookmarks, design of a portal); employment-related information (employer name, address, job title, job classification, salary range, supervisor's name and phone number, and the like): personal demographic information (sex, age, date of birth, marital status, spouse information); property-related information (own/rent home, amount of money in various bank accounts, ownership of stocks or other securities, property ownership information, personal property such as car, boat, private jet, and other details); health related information (types of medication currently used, surgeries undergone, type of drugs that tend to cause allergic reactions, smoking/drinking habits, hospitalization information, status of the several parts of the body, dental records, eye care information, genetic information, family medical history, etc); biometric information (retina scan, samples of speech, finger prints, DNA sequences, and other information); credit related information (rent/mortgage payments, landlord/lender's name, address, phone number, credit card information and the like); personal preferences (movies, travel, books, frequent flier club memberships, important dates such as birthdays, anniversary dates, magazine subscriptions, etc); preferences such as choice of long-distance company, the features used in one's telephone service such as call waiting, call forwarding, three-way calling; names of friends and family members; travel preferences such as preferred airline, class of travel, whether an aisle or a window seat is preferred, whether a rental car is required, what size car is required; hotel preferences such as smoking/non-smoking section, any wake-up call is required, and if so, at what time, the type of amenities preferred or required at the hotel; pleasure-related preferences such as tee-time at a golf course, theater preferences, seat preferences, etc; or preferences for billing and payment methods (cash, credit/debit card, and the like). It should be noted that the type of information that can be stored in these tables can be unlimited. There is no requirement that all the pieces of information need to be furnished, since a requester 105 of information will be provided only that which is made available with the data base 130 or that which is authorized to be released to the requester 105.
  • [0037]
    A requester 105 that requests information also identifies himself and presents authorization from the user 103. Tables are also devised to store such requester's identification and authorization information for storage in the database 108. All accesses of information are recorded to generate a verifiable audit trail. Tables to store such audit information are designed in the database 108, preferably in a secure partition reachable only by persons with a very high security clearance.
  • Configuring the Server Computer
  • [0038]
    In a preferred embodiment, the server computer 100 is configured—in addition to being configured as a web server—to include a number of modules: a user account establishment module 110; a user account management module 112; a personal information collection module 114; a request reception module 116; an authorization verification module 118; a security module 120; a database interface module 130: a statistics module 140; and a report generation module 150. The server computer 100 preferably includes a trusted computer base (TCB) comprising a secure kernel, which includes the security module 120. Most of the security relevant code is stored in the secure kernel. All security relevant events are audited, recorded. Further, events that signal any breach of security are defined and programmed. Upon the occurrence of such an event, an action, including sending an alarm to a predefined entity or person, is performed. Preferably, the modules are implemented as independent memory-resident processes—such as UNIX™ processes—capable of communicating with each other using inter-process communication facilities such as queues, semaphores, sockets, pipes, shared memory and the like. These modules can be programmed by persons skilled in the art using programming languages and techniques such as C, C++, Java or Enterprise Java Beans. It should be noted that the number, nature and functionality of the modules described herein could be differently designed by other designers, and therefore should not be a limiting factor in construing the invention.
  • [0039]
    Referring to FIGS. 2 and 3, in a preferred embodiment, the user 103 accesses the PIRSP's web site whereupon the server computer 100 first establishes a secure connection with the user computer 104 (step 202).
  • [0040]
    The server computer 100 comprises at least one of a plurality of web pages such as the web page 300, which are displayed on the user computer 104. When the web page 300 is displayed, the user 103 is allowed to set up an account with the PIRSP, by entering his name or other identifier in a first text field 302, optionally entering a password string in a second text field 304 and selecting a push button 310 to transmit the web page 300 to the server computer 100 (step 204). In other embodiments, the user 103 provides information to the PIRSP, which information comprises a name, a billing address, a contact E-mail address.
  • [0041]
    The CGI programs 107 executing on the server computer 100 receive the web page 300, and invoke the user account establishment module 110 to create a new account for the user 103. This process includes allocating an account number to the user 103, which account number is preferably stored in the database 108 (step 206). In a preferred embodiment, this process of receiving and transmitting packets of data is performed by the CGI programs 107 during all interactions with the server computer 100. Therefore, in the following, this description is omitted.
  • [0042]
    The user account management module 112 comprises code configured to record every access of the user's personal information by the user 103 in the database 108. This establishes an audit trail for a subsequent use (step 208).
  • [0043]
    The user 103 thereafter enters his personal information such as the kind of information described before, by entering the information via text or other selections made in web pages displayed by the server computer 100 (step 210). It should be noted that since many areas of personal information can be stored by the user 103, it is not required that all such information be entered by the user 103 at one time. For example, the user 103 may initially wish to store his travel preferences and nothing else. This could be because he contemplates travel and wishes to provide this information to his travel agent. Later, the user 103 may enter his medical information and store it in appropriate tables since he wishes to visit his doctor. In this manner, at various times, the user 103 may furnish different aspects of personal information, which will be stored for a future use after it is entered once.
  • [0044]
    The user account management module additionally allows the user 103 to change or to update the user's password, address, telephone number or any other information. The user can change or update his personal information any time after the account is established. Preferably, the user can also provide a list of entities that should be notified for each change. In one embodiment, each information object that is changed or updated is notified to a list of authorized recipients automatically. In another embodiment, a change or an update is provided to a requester 105 when a request is made.
  • [0045]
    The user account management module 112 optionally allows the user 103 to select a payment plan for the services rendered by the PIRSP, block any request if the user 103 is in default of a payment, obtain credit card or other verification, and the like. In a preferred embodiment, the payment plans for the user 103 depend on the number of security classifications the user 103 has chosen, the number and nature of the information objects stored by the user 103, the number of requests for information received, the number of accesses or updates made by the user 103 to view and/or change the information objects, the type of customer service requested, the number of entities to which any changes are to be notified, the resources utilized by the user 103, or a combination of these and similar types of activities.
  • [0046]
    Preferably after user enrollment, the personal information collection module 114 obtains control of the program execution and presents the user 103 with at least one of a series of web pages. These web pages allow the user 103 to provide information to store in corresponding tables described above. In other embodiments, the user provides his information in a paper form, which is entered by the PIRSP into the database 108. Preferably, the user 103 also provides a security classification for each information object, at the tuple or at the field level, by selecting a radio button or a check box for each information object. In a preferred embodiment, there are a predetermined number of security classifications; in other embodiments, there could be a numerical value given to each class of security desired, and the higher the numerical value, the greater is the security classification. No security classification may imply that the information can be released freely to the requester 105, if the user's name is specified.
  • [0047]
    After the user 103 fills out the web page forms displayed on the client computer 100, the web pages are transmitted to the server computer 100, whereupon the CGI programs 107 receive, parse, and deliver portions of data to the database interface module 130 which stores portions of data entered by the user 103 as information objects in the database 108 in appropriate tables. In a preferred embodiment, the information objects that could be stored in a plurality of tables are collected from the user 103 in a single web page form. In other embodiments, each table or each part of a table can be separately populated with an information object or several objects retrieved from a single web page. In an alternative embodiment, the series of web pages can be displayed as framed or overlapping web pages and the user 103 preferably navigates from one page to another page by simply clicking on a predetermined area on a web page.
  • [0048]
    Preferably, the user 103 obtains from the server computer 100 at least one key to access his personal information. In one aspect, the key is provided to an authorized entity to enable access of the user's personal information stored in the database 108. There could be a number of types of authorization keys obtainable by the user: a one-time-use-only authorization key, a multiple use authorization key, a qualified authorization key, and others. In another aspect, the attributes encoded in the authorization key allows the release of a specific type of information from the server computer 100. Preferably, these encoded attributes of the authorization key—such as, how many times the authorization can be used to obtain access, what information is accessible using the authorization, any expiration time on the password, whether or not the trustworthiness of the requester is a precondition before releasing the information and the like. In a preferred embodiment, the user 103 specifies these criteria and requests a key from the server computer 100. The key is preferably a string of alphanumeric characters of sufficient length as to prevent being deciphered easily by unscrupulous persons. In other embodiments, the authorization key is preferably encrypted, comprise a spoken word or phrase, a finger print scan, a retina scan, DNA identification, or other forms of identification. These keys could be used in a case such as when the user 103 is unconscious, and an immediate need exists to obtain medical or other information in order to save the patient.
  • [0049]
    In a preferred embodiment, the database interface module 130 comprises code to establish and verify security classification for each information object stored in the database. Preferably, for each information object, which could be a field, a row, a column, a tuple, or an entire table, a security classification is provided, which is marked on the object. This security classification is preferably an explicit and well-defined policy enforced by the security module 120. Individual accesses of each information object is recorded in the database 108. Each requester is clearly identified and an explicit audit trail for each access is recorded in the database 108. In another aspect, the database interface module 130 operates as a reference monitor as well. The reference monitor mediates all accesses of requests for information objects. Other methods of ensuring, security include establishing access control lists for each level of a multi-level security system, a system such as the Signed Document Markup Language (SDML); usage of trusted and known sources such as well-known companies as the requesters, public key encryption, third-party authentication, and other similar techniques.
  • [0050]
    In a preferred embodiment, potential requesters are also enrolled by the PIRSP in a similar manner as described for the user 103 (step 214). The server computer 100 establishes accounts for potential requesters, allocates identifiers, authenticates their trustworthiness and enables them to establish a payment/billing plan for accessing information objects stored by the user 103. In one embodiment, where there are a number of users, statistical information, rather than individual pieces of information objects are offered for sale to potential requesters. In other embodiments, the potential requesters do not establish accounts with the PIRSP, and will pay as they go for each access of information as described below.
  • [0051]
    In an embodiment, the user 103 provides his identifier and a secure password, to a requester 105. This could be done, for example, when the user 103 decides to provide a travel agent or a tailor that his personal travel preferences or style and measurements can be obtained from the server computer 100 operated by the PIRSP. In one embodiment, the requester's web page (not shown) comprises an area, selecting which the user 103 can specify that his information can be obtained from the PIRSP's web site. Preferably, the user 103 provides his identifier, a specific authorization—for example to fetch the travel preferences or the medical history and nothing else—and requests the requester 105 to obtain his personal information from the PIRSP. The requester computer 106 is configured to receive this authorization over a secure channel, and to initiate a request to the PIRSP for the user's personal information.
  • [0052]
    In an alternative embodiment, the requester 105 requests the user 103 manually to fill out a form. This may happen in cases where the user 103 visits a doctor's office, or attempts to establish an appointment with the doctor's office. The doctor's office, which could be enrolled with the PIRSP, may request that the user 103 provide personal information via the PIRSP. The user 103 provides the requester 105 his identifier and authorization to obtain the information from the PIRSP.
  • II. Securely Disbursing Personal Information
  • [0053]
    In one embodiment, the PIRSP publicly discloses the database schema, so that any requester 105 can specify the type of information by naming the table and the fields that they want. In other embodiments, the actual database schema are kept secret, but the nature of information that is made available, for access by a requester is announced to potential requesters.
  • [0054]
    The requester 105 preferably establishes a secure connection with the server computer 100 and presents the user's identifier and authorization to the server computer 100 (step 216). Preferably, this process includes the following steps. First, a session with an encrypted Secure Socket Layer connection is established between the requester computer 106 and the server computer 100. Second, the requester 105 transmits at least one packet of data to the server computer 100, said packet of data comprising its identification, its electronic address (either dotted decimal form or other forms), any processor identifier of the requester computer 106. The server computer 100 receives these data and records them in the database 108 along with the time and date when the request is made. Third, the requester computer 106 is configured to present the user's identifier and authorization to the server computer. Alternatively, the requester 105 sends a secure electronic mail (E-mail) to the server computer 100, which E-mail comprises a user identifier, a user-provided authorization key or password, and a request in the form of a database query.
  • [0055]
    In an alternative embodiment, the requester 105 can be the same as the user 103, such as in case the user 103 wishes to store information for himself, e.g., personal or business phone numbers, E-mail addresses, and other similar information typically stored in a person's wallet, frequent flier numbers, passwords to debit cards, preferences and the like. In this case, an authorization is not required for the user 103 to view information objects stored by him.
  • [0056]
    Preferably, after authenticating the requester 105, and if the requester 105 is determined to be a genuine entity, a security level is assigned to the requester's request (step 218). The security module 120 verifies the security classification for each field or information object requested before releasing it to the requester 105. Preferably, an information object is released to the requester only if the requester's security classification is at least that of the information object requested. Otherwise, the request is discarded and the attempt by the requester 105 is recorded as a failed request.
  • [0057]
    In a preferred embodiment, a requester that makes a predetermined number of unauthorized or failed requests is tagged as “junk” requester. The junk requester's identification information is stored in the database 108. A further request from this junk requester is ignored or an alarm message is generated to take an appropriate action (step 220).
  • [0058]
    The security module 120 preferably performs authentication and verification by assigning a numerical value to the requester 105. Any authorization from the user 103 presented by the requester 105 is also assigned a numerical value. Further, each information object that the requester 105 wishes to access from the server computer 100 is also assigned a numerical value. Preferably, these numerical values represent a corresponding security level for each entity or item to which the value is assigned. In alternative embodiments, numerical values representing security levels are also assigned to the requester's computer 104, the network 102 from which the request arrived at the server computer 100 and other participating entities. The security module 120 thereafter examines the security levels of each entity included in the data transfer process (transaction) to determine the overall security level for the transaction. In a preferred embodiment, any requested information is released to a requester only if the security level of the requester 105 is at least that of all information objects requested. In other embodiments, only those information objects that are at or below the security level of the requester 105 are released to the requester.
  • [0059]
    In a preferred embodiment, the requester 105 formulates a query, in a readily executable form, preferably in a language such as the Structured Query Language. In other embodiments, the query by the requester 105 is a listing of the information objects requested. The database interface module 130 then executes at least one of a series of queries to extract the information sought by the requester 105 (step 222). The query optimizer included in the database 108 optimally retrieves the stored information after verifying the security level of the request, with the security level designated by the user 103 for an information object.
  • [0060]
    Several alternative methods of accessing information are used by the security module 120 and the database interface module 130. In one method, the database interface module 130 retrieves an information object if the security level of that information object is at or below the security level for the request and that of the authorization. In another embodiment, a data base view is automatically defined to extract all individually classified information objects, and in this case, it the security level of an information object is above the security level for the request, a blank entry is returned. Alternatively, the database interface module 130 may insert an indication instead of a blank entry, which indication specifies that either the information is not available, or it is available for a requester with a higher security level, and the like.
  • [0061]
    In another embodiment, the user 103 requests the PIRSP to disburse information to the requester 103 using an electronic means (step 224). In this case, the user is authenticated and the information objects are downloaded or transmitted to the requester 105, preferably via secure E-mail, file transfer protocol, after establishing a circuit-switched connection, facsimile, U.S. mail or any other method.
  • [0062]
    Preferably, the requester 105 is forbidden from reselling or retransmitting the information, or using it beyond an expiration date set either by the user 103 or by the PIRSP. Preferably, to ensure this, information objects are copyrighted or otherwise contractually protected. Further, this could be a selling point to users, since the PIRSP not only guarantees the safety of the stored information, but in addition controls how this information is used.
  • [0063]
    In one embodiment, the requester 105 is charged a fee for receiving the information objects, on a per object basis, or on a subscription basis or for receiving statistical reports. The PIRSP may provide an incentive to the user 103 by paying the user 103 a portion of the fee to the user 103. In another embodiment, a requester may receive statistical report such as “how many male golf players between the ages 22 and 55 in the zip code 20006 are interested in trading stocks?” The statistics module 140 and report generation module 150 make appropriate queries in the database 108 and obtain the information. Preferably such statistical information is not considered secure, unless it has a tendency to reveal too much about the private habits of the user 103. Thus, so long as information is aggregated and can remain anonymous, it will be released to potential requesters to assist marketing of products/services.
  • [0064]
    The user 103 may change or update his personal information. Examples of changes could be address or telephone number changes, and the like. Some changes are effective at a future date. Some information is updated either by the user 103 or by a third party (not shown). An example of such updated information is medical information. When the user 103 makes the changes, he makes these by accessing the server computer 100 web site and entering his information as described above. The user 103 elects or designates any requesters or recipients of change notifications. The server computer 100 automatically retrieves the information objects that changed and notifies the designated requesters or recipients via secure E-mail, or other methods indicated above (step 226). In alternative embodiments, notification messages are left in mail boxes located on the server computer 100 and owned by requesters. Each change notification is recorded in the database 108 for audit trail purposes.
  • [0065]
    In a preferred embodiment, every time an information object is accessed, an entry is made into the database 108 and a secure audit trail established (step 228). This audit trail is preferably designed to track the activities of the PIRSP as well as the activities of the user 103 and the requester 105. This ensures that a clear audit is preserved to determine and prevent any misuse of personal information. Preferably such audit trail is established by programming in the secure kernel included in the server computer 100. All activities are stored in a specially partitioned area of the database 108 and are read-only after written by any process.
  • [0066]
    The foregoing describes a method and a system for obtaining, storing and automatically disbursing personal information over a communications network. Though reference is made only to a single instance of each of the client and the server computers, it should be noted that the invention can be practiced using an architecture comprising a plurality of client computers (not shown) and/or a plurality of server computers (not shown). Additionally, though reference is made only to a single processor computer, the server or the client computer could comprise a distributed, parallel computing environment, either including a single-processor or a multiple-processor architecture, whether symmetric or asymmetric. In alternative embodiments, the user 103 operating the user computer 104 is thought to interact with the server computer 100 using a model such as that facilitated by the Java Bean, the Enterprise Java Bean or other similar technologies such as Remote Method Invocation, Distributed Component Object Model. Sessions could be implemented by using stateful or stateless Enterprise Java Beans and the like. The database 108 can be accessed via session or other kinds of beans, either a single instance of them or via numerous instances managed by another object layer. In alternative embodiments, the invention described herein can be implemented in part on the server computer 100 and in part on the user computer 104, in part as a servlet, as a downloaded JavaScript™ program, as a plug-in program, as an applet, or any combinations thereof. In alternative embodiments, the server computer 100 is located behind a fire-wall, and may store a cookie, download a Dynamic HTML script, a JavaScript program or a plug-in program to the user computer 104 to achieve a portion of the functionality described herein. In one embodiment, no software is deposited on the user computer 104 other than the HTML page displayed on a browser. The word “network” comprises any heterogenous or homogenous collection of computer networks, public or private or a combination of both, which network includes intelligent or “passive” elements; either wholly or partly, and further includes routers, bridges and other transport mechanisms; executing a single protocol or a combination of a plurality of data communication protocols; effecting communication (transmission and/or reception) of information, which information comprises voice, video, data, and/or text or any combinations thereof; using either in-band or out-of-band methods. The word “database” is assumed to comprise a flat file, an area in memory, an index file, a relational database, a sequential or a random access data storage and retrieval method operating in conjunction with any type of device, a distributed database or a single database, and could further comprise a relational database, hierarchical, sequential, random access or any other type of database, with or without a transaction manager, concurrency controller, memory manager, or a query optimizer. Further, the steps described herein are illustrative and not limiting, and the order of the steps described could be altered. Moreover, some of the steps could be collapsed into a single step, while some other steps are superfluous or optional and are described only to elaborate the principles of the invention. Persons skilled in the art may make modifications, rearrangements and adjustments to the disclosed preferred embodiments without undue experimentation or without significantly departing from the spirit and scope of the appended claims, which claims should be construed to include all these modifications, rearrangements, adjustments, and departures.
Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US4491725 *Sep 29, 1982Jan 1, 1985Pritchard Lawrence EMedical insurance verification and processing system
US4956769 *May 16, 1988Sep 11, 1990Sysmith, Inc.Occurence and value based security system for computer databases
US5204897 *Jul 14, 1992Apr 20, 1993Digital Equipment CorporationManagement interface for license management system
US5247672 *Feb 15, 1990Sep 21, 1993International Business Machines CorporationTransaction processing system and method with reduced locking
US5355474 *Sep 27, 1991Oct 11, 1994Thuraisngham Bhavani MSystem for multilevel secure database management using a knowledge base with release-based and other security constraints for query, response and update modification
US5474839 *Dec 13, 1993Dec 12, 1995Matsushita Electric Industrial Co., Ltd.Surface-treated apparel material
US5510777 *Dec 28, 1993Apr 23, 1996At&T Corp.Method for secure access control
US5608874 *Apr 8, 1995Mar 4, 1997Autoentry Online, Inc.System and method for automatic data file format translation and transmission having advanced features
US5765152 *Oct 13, 1995Jun 9, 1998Trustees Of Dartmouth CollegeSystem and method for managing copyrighted electronic media
US5832208 *Sep 5, 1996Nov 3, 1998Cheyenne Software International Sales Corp.Anti-virus agent for use with databases and mail servers
US5832508 *Nov 14, 1996Nov 3, 1998Sybase, Inc.Method for deallocating a log in database systems
US5848426 *Feb 5, 1996Dec 8, 1998Metanetics CorporationAutomatic data translation between different business systems
US5930759 *Apr 30, 1996Jul 27, 1999Symbol Technologies, Inc.Method and system for processing health care electronic data transactions
US5931901 *Mar 21, 1997Aug 3, 1999Robert L. WolfeProgrammed music on demand from the internet
US5974389 *Mar 1, 1996Oct 26, 1999Clark; Melanie AnnMedical record management system and process with improved workflow features
US6005939 *Dec 6, 1996Dec 21, 1999International Business Machines CorporationMethod and apparatus for storing an internet user's identity and access rights to world wide web resources
US6042519 *Jun 10, 1999Mar 28, 2000Shea; Michael J.Exercise apparatus
US6073106 *Oct 30, 1998Jun 6, 2000Nehdc, Inc.Method of managing and controlling access to personal information
US6076109 *Jan 30, 1997Jun 13, 2000Lextron, Systems, Inc.Simplified-file hyper text protocol
US6092196 *Nov 25, 1997Jul 18, 2000Nortel Networks LimitedHTTP distributed remote user authentication system
US6175831 *Jan 17, 1997Jan 16, 2001Six Degrees, Inc.Method and apparatus for constructing a networking database and system
US6181803 *Sep 30, 1996Jan 30, 2001Intel CorporationApparatus and method for securely processing biometric information to control access to a node
US6205478 *Dec 30, 1998Mar 20, 2001Fujitsu LimitedSystem for exchanging user information among users
US6269369 *Nov 2, 1997Jul 31, 2001Amazon.Com Holdings, Inc.Networked personal contact manager
US6361012 *Jul 6, 2000Mar 26, 2002Punch Video Inc.Television stand for a vehicle
US6377161 *Aug 11, 1998Apr 23, 2002Motorola, Inc.Method and apparatus in a wireless messaging system for facilitating an exchange of address information
US6405195 *Mar 27, 2000Jun 11, 2002Spotfire AbSystem and method for collaborative hosted analysis of data bases via a network portal
US6453305 *May 21, 1999Sep 17, 2002Compaq Computer CorporationMethod and system for enforcing licenses on an open network
US6487552 *Oct 5, 1998Nov 26, 2002Oracle CorporationDatabase fine-grained access control
US6496849 *Oct 25, 1999Dec 17, 2002Zaplet, Inc.Electronic media for communicating information among a group of participants
US6505160 *May 2, 2000Jan 7, 2003Digimarc CorporationConnected audio and other media objects
US6507865 *Jan 14, 2000Jan 14, 2003Zaplet, Inc.Method and system for group content collaboration
US6615251 *Nov 30, 1999Sep 2, 2003John R. KlugMethod for providing node targeted content in an addressable network
US6792458 *Oct 4, 2000Sep 14, 2004Urchin Software CorporationSystem and method for monitoring and analyzing internet traffic
US6845448 *Jan 7, 2000Jan 18, 2005Pennar Software CorporationOnline repository for personal information
US6859805 *Nov 29, 1999Feb 22, 2005Actuate CorporationMethod and apparatus for generating page-level security in a computer generated report
US6882793 *Jun 16, 2000Apr 19, 2005Yesvideo, Inc.Video processing system
US7058696 *Nov 1, 2000Jun 6, 2006Mangosoft CorporationInternet-based shared file service with native PC client access and semantics
US7155737 *May 11, 1999Dec 26, 2006Entrust, Inc.Integrating user specified extensions into an information access system
US7167904 *Mar 16, 2000Jan 23, 2007Network Solutions, LlcUnified web-based interface-to multiple registrar systems
US7243079 *Nov 22, 2000Jul 10, 2007Shutterfly, Inc.User interface and methods for online print service
US7246069 *Oct 15, 1999Jul 17, 2007Ue Systems, Inc.Method and apparatus for online health monitoring
US7353199 *Sep 24, 1999Apr 1, 2008Perfect Web Technologies, Inc.Method of moderating external access to an electronic document authoring development and distribution system
US7630986 *Oct 27, 2000Dec 8, 2009Pinpoint, IncorporatedSecure data interchange
US20010031066 *Jan 24, 2001Oct 18, 2001Meyer Joel R.Connected audio and other media objects
US20010050990 *Dec 27, 1999Dec 13, 2001Frank Wells SudiaMethod for initiating a stream-oriented encrypted communication
US20020059402 *Aug 14, 1998May 16, 2002Charles E. BelangerServer-sided internet-based platform independent operating system and application suite
US20020069272 *Jan 19, 2001Jun 6, 2002Kim Steven D.System and method for managing server configurations
US20030022141 *Apr 5, 2002Jan 30, 2003Packard R. AndrewInteractive patient educational tool
US20030069874 *May 5, 2000Apr 10, 2003Eyal HertzogMethod and system to automate the updating of personal information within a personal information management application and to synchronize such updated personal information management applications
US20040021686 *Jul 30, 2002Feb 5, 2004Barberis Romain P.Method and system for collaborative interaction on a document
US20040220829 *Feb 5, 2003Nov 4, 2004Ofir BaharavDistributed system and method for managing communication among healthcare providers, patients and third parties
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US6980993Mar 14, 2002Dec 27, 2005Microsoft CorporationSchemas for a notification platform and related information services
US7028892 *Mar 19, 2004Apr 18, 2006Morgan Carroll HEmergency identification pouch with DNA source specimen
US7085893 *Sep 11, 2003Aug 1, 2006International Business Machines CorporationNegotiated distribution of cache content
US7085894Sep 11, 2003Aug 1, 2006International Business Machines CorporationSelectively accepting cache content
US7206788Jul 30, 2002Apr 17, 2007Microsoft CorporationSchema-based services for identity-based access to device data
US7302634 *Oct 22, 2001Nov 27, 2007Microsoft CorporationSchema-based services for identity-based data access
US7346665 *Jun 4, 2002Mar 18, 2008United States Postal ServiceSystem and method for multilevel government information accessing kiosk with uniform display
US7548932 *Aug 12, 2005Jun 16, 2009Microsoft CorporationSchemas for a notification platform and related information services
US7613721 *Aug 12, 2005Nov 3, 2009Microsoft CorporationSchemas for a notification platform and related information services
US7805415 *Sep 28, 2010Lockheed Martin CorporationSystems and methods for sharing data between entities
US7860871Jan 19, 2006Dec 28, 2010Jumptap, Inc.User history influenced search results
US7885686 *Feb 8, 2011Nokia CorporationElectronic transactions
US7899455Feb 11, 2010Mar 1, 2011Jumptap, Inc.Managing sponsored content based on usage history
US7907940Apr 30, 2010Mar 15, 2011Jumptap, Inc.Presentation of sponsored content based on mobile transaction event
US7970389Apr 16, 2010Jun 28, 2011Jumptap, Inc.Presentation of sponsored content based on mobile transaction event
US8005891Jul 21, 2006Aug 23, 2011Research In Motion LimitedMethod for training a server for content delivery based on communication of state information from a mobile device browser
US8015058Aug 12, 2005Sep 6, 2011Salesforce.Com, Inc.User-maintained contact information data system
US8024317Nov 18, 2008Sep 20, 2011Yahoo! Inc.System and method for deriving income from URL based context queries
US8027879Oct 30, 2007Sep 27, 2011Jumptap, Inc.Exclusivity bidding for mobile sponsored content
US8032508Oct 4, 2011Yahoo! Inc.System and method for URL based query for retrieving data related to a context
US8041717Jul 30, 2010Oct 18, 2011Jumptap, Inc.Mobile advertisement syndication
US8050675Sep 24, 2010Nov 1, 2011Jumptap, Inc.Managing sponsored content based on usage history
US8055675 *Nov 8, 2011Yahoo! Inc.System and method for context based query augmentation
US8060492Nov 15, 2011Yahoo! Inc.System and method for generation of URL based context queries
US8069142Dec 6, 2007Nov 29, 2011Yahoo! Inc.System and method for synchronizing data on a network
US8099434Apr 29, 2010Jan 17, 2012Jumptap, Inc.Presenting sponsored content on a mobile communication facility
US8103545Nov 5, 2005Jan 24, 2012Jumptap, Inc.Managing payment for sponsored content presented to mobile communication facilities
US8108778Sep 30, 2008Jan 31, 2012Yahoo! Inc.System and method for context enhanced mapping within a user interface
US8131271Oct 30, 2007Mar 6, 2012Jumptap, Inc.Categorization of a mobile user profile based on browse behavior
US8150967Mar 24, 2009Apr 3, 2012Yahoo! Inc.System and method for verified presence tracking
US8156128Jun 12, 2009Apr 10, 2012Jumptap, Inc.Contextual mobile content placement on a mobile communication facility
US8156537 *Nov 30, 2007Apr 10, 2012Sap AgMethod and system for access control using resource filters
US8166016Dec 19, 2008Apr 24, 2012Yahoo! Inc.System and method for automated service recommendations
US8166168Apr 24, 2012Yahoo! Inc.System and method for disambiguating non-unique identifiers using information obtained from disparate communication channels
US8175585May 8, 2012Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8180332May 15, 2012Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8195133Jun 5, 2012Jumptap, Inc.Mobile dynamic advertisement creation and placement
US8195513Nov 12, 2011Jun 5, 2012Jumptap, Inc.Managing payment for sponsored content presented to mobile communication facilities
US8195763 *Jul 21, 2006Jun 5, 2012Research In Motion LimitedSecure method of synchronizing cache contents of a mobile browser with a server
US8200205Jul 14, 2011Jun 12, 2012Jumptap, Inc.Interaction analysis and prioritzation of mobile content
US8209344Jun 26, 2012Jumptap, Inc.Embedding sponsored content in mobile applications
US8229914Jul 24, 2012Jumptap, Inc.Mobile content spidering and compatibility determination
US8238888Mar 23, 2011Aug 7, 2012Jumptap, Inc.Methods and systems for mobile coupon placement
US8270955Sep 18, 2012Jumptap, Inc.Presentation of sponsored content on mobile device based on transaction event
US8271506Sep 18, 2012Yahoo! Inc.System and method for modeling relationships between entities
US8281027Oct 2, 2012Yahoo! Inc.System and method for distributing media related to a location
US8290810Oct 30, 2007Oct 16, 2012Jumptap, Inc.Realtime surveying within mobile sponsored content
US8296184Feb 17, 2012Oct 23, 2012Jumptap, Inc.Managing payment for sponsored content presented to mobile communication facilities
US8302030Oct 30, 2012Jumptap, Inc.Management of multiple advertising inventories using a monetization platform
US8307029Dec 10, 2007Nov 6, 2012Yahoo! Inc.System and method for conditional delivery of messages
US8311888Mar 9, 2009Nov 13, 2012Jumptap, Inc.Revenue models associated with syndication of a behavioral profile using a monetization platform
US8316031Sep 6, 2011Nov 20, 2012Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8332397Jan 30, 2012Dec 11, 2012Jumptap, Inc.Presenting sponsored content on a mobile communication facility
US8340666Dec 25, 2012Jumptap, Inc.Managing sponsored content based on usage history
US8351933Sep 24, 2010Jan 8, 2013Jumptap, Inc.Managing sponsored content based on usage history
US8359019Jan 22, 2013Jumptap, Inc.Interaction analysis and prioritization of mobile content
US8364521Nov 14, 2005Jan 29, 2013Jumptap, Inc.Rendering targeted advertisement on mobile communication facilities
US8364540Jan 29, 2013Jumptap, Inc.Contextual targeting of content using a monetization platform
US8364611Aug 13, 2009Jan 29, 2013Yahoo! Inc.System and method for precaching information on a mobile device
US8364711 *Jan 29, 2013John WilkinsContact management system and method
US8374926Mar 5, 2010Feb 12, 2013Worthwhile ProductsInventory control system
US8386506Aug 21, 2008Feb 26, 2013Yahoo! Inc.System and method for context enhanced messaging
US8402356Nov 22, 2006Mar 19, 2013Yahoo! Inc.Methods, systems and apparatus for delivery of media
US8433297Apr 30, 2013Jumptag, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8447359 *May 21, 2013Nokia CorporationElectronic transactions
US8452855Jun 27, 2008May 28, 2013Yahoo! Inc.System and method for presentation of media related to a context
US8457607Sep 19, 2011Jun 4, 2013Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8463249Jun 11, 2013Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8467774Sep 19, 2011Jun 18, 2013Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8483671Aug 26, 2011Jul 9, 2013Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8483674Sep 18, 2011Jul 9, 2013Jumptap, Inc.Presentation of sponsored content on mobile device based on transaction event
US8484234Jun 24, 2012Jul 9, 2013Jumptab, Inc.Embedding sponsored content in mobile applications
US8489077Sep 19, 2011Jul 16, 2013Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8490154Sep 21, 2007Jul 16, 2013Sap AgMethod and system for authentication by defining a demanded level of security
US8494500Sep 19, 2011Jul 23, 2013Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8503995Oct 29, 2012Aug 6, 2013Jumptap, Inc.Mobile dynamic advertisement creation and placement
US8509750Sep 18, 2011Aug 13, 2013Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8515400Sep 18, 2011Aug 20, 2013Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8515401Sep 18, 2011Aug 20, 2013Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8532633Sep 18, 2011Sep 10, 2013Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8532634Sep 19, 2011Sep 10, 2013Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8538811Mar 3, 2008Sep 17, 2013Yahoo! Inc.Method and apparatus for social network marketing with advocate referral
US8538812Oct 18, 2012Sep 17, 2013Jumptap, Inc.Managing payment for sponsored content presented to mobile communication facilities
US8543697Jul 21, 2006Sep 24, 2013Research In Motion LimitedSystem and method for communicating state management between a browser user-agent and a server
US8554192Jan 21, 2013Oct 8, 2013Jumptap, Inc.Interaction analysis and prioritization of mobile content
US8554623Mar 3, 2008Oct 8, 2013Yahoo! Inc.Method and apparatus for social network marketing with consumer referral
US8560390Mar 3, 2008Oct 15, 2013Yahoo! Inc.Method and apparatus for social network marketing with brand referral
US8560537Oct 8, 2011Oct 15, 2013Jumptap, Inc.Mobile advertisement syndication
US8561145 *Dec 7, 2005Oct 15, 2013Samsung Electronics Co., Ltd.Service providing method using profile information and system thereof
US8572576Feb 3, 2006Oct 29, 2013Microsoft CorporationExecuting dynamically assigned functions while providing services
US8577759Jul 16, 2012Nov 5, 2013Worthwhile ProductsInventory control system process
US8583089Jan 31, 2012Nov 12, 2013Jumptap, Inc.Presentation of sponsored content on mobile device based on transaction event
US8583668Jul 30, 2008Nov 12, 2013Yahoo! Inc.System and method for context enhanced mapping
US8589486Mar 28, 2008Nov 19, 2013Yahoo! Inc.System and method for addressing communications
US8594702Nov 6, 2006Nov 26, 2013Yahoo! Inc.Context server for associating information based on context
US8615719Nov 5, 2005Dec 24, 2013Jumptap, Inc.Managing sponsored content for delivery to mobile communication facilities
US8620285Aug 6, 2012Dec 31, 2013Millennial MediaMethods and systems for mobile coupon placement
US8626736Nov 19, 2012Jan 7, 2014Millennial MediaSystem for targeting advertising content to a plurality of mobile communication facilities
US8631018Dec 6, 2012Jan 14, 2014Millennial MediaPresenting sponsored content on a mobile communication facility
US8655891Nov 18, 2012Feb 18, 2014Millennial MediaSystem for targeting advertising content to a plurality of mobile communication facilities
US8660891Oct 30, 2007Feb 25, 2014Millennial MediaInteractive mobile advertisement banners
US8666376Oct 30, 2007Mar 4, 2014Millennial MediaLocation based mobile shopping affinity program
US8666919Jul 29, 2011Mar 4, 2014Accenture Global Services LimitedData quality management for profiling, linking, cleansing and migrating data
US8671154Dec 10, 2007Mar 11, 2014Yahoo! Inc.System and method for contextual addressing of communications on a network
US8688088Apr 29, 2013Apr 1, 2014Millennial MediaSystem for targeting advertising content to a plurality of mobile communication facilities
US8688671Nov 14, 2005Apr 1, 2014Millennial MediaManaging sponsored content based on geographic region
US8689312 *Apr 23, 2012Apr 1, 2014Facebook Inc.Leveraging a persistent connection to access a secured service
US8706406Jun 27, 2008Apr 22, 2014Yahoo! Inc.System and method for determination and display of personalized distance
US8745133Mar 28, 2008Jun 3, 2014Yahoo! Inc.System and method for optimizing the storage of data
US8762285Jun 24, 2008Jun 24, 2014Yahoo! Inc.System and method for message clustering
US8768319Sep 14, 2012Jul 1, 2014Millennial Media, Inc.Presentation of sponsored content on mobile device based on transaction event
US8769099Dec 28, 2006Jul 1, 2014Yahoo! Inc.Methods and systems for pre-caching information on a mobile computing device
US8769645 *Sep 15, 2012Jul 1, 2014Facebook, Inc.Brokering a connection to access a secured service
US8774777Apr 29, 2013Jul 8, 2014Millennial Media, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8798592Apr 29, 2013Aug 5, 2014Jumptap, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8799371Sep 24, 2008Aug 5, 2014Yahoo! Inc.System and method for conditional delivery of messages
US8805339Oct 20, 2011Aug 12, 2014Millennial Media, Inc.Categorization of a mobile user profile based on browse and viewing behavior
US8812526Oct 18, 2011Aug 19, 2014Millennial Media, Inc.Mobile content cross-inventory yield optimization
US8813107Jun 27, 2008Aug 19, 2014Yahoo! Inc.System and method for location based media delivery
US8819659Mar 29, 2011Aug 26, 2014Millennial Media, Inc.Mobile search service instant activation
US8819793Sep 20, 2011Aug 26, 2014Csidentity CorporationSystems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository
US8832100Jan 19, 2006Sep 9, 2014Millennial Media, Inc.User transaction history influenced search results
US8843395Mar 8, 2010Sep 23, 2014Millennial Media, Inc.Dynamic bidding and expected value
US8843396Sep 16, 2013Sep 23, 2014Millennial Media, Inc.Managing payment for sponsored content presented to mobile communication facilities
US8849736Jan 21, 2014Sep 30, 2014Accenture Global Services LimitedData quality management for profiling, linking, cleansing, and migrating data
US8856167 *Oct 3, 2011Oct 7, 2014Yahoo! Inc.System and method for context based query augmentation
US8892495Jan 8, 2013Nov 18, 2014Blanding Hovenweep, LlcAdaptive pattern recognition based controller apparatus and method and human-interface therefore
US8914342Aug 12, 2009Dec 16, 2014Yahoo! Inc.Personal data platform
US8930494 *Apr 24, 2012Jan 6, 2015Blackberry LimitedSecure method of synchronizing cache contents of a mobile browser with a server
US8958779Aug 5, 2013Feb 17, 2015Millennial Media, Inc.Mobile dynamic advertisement creation and placement
US8989718Oct 30, 2007Mar 24, 2015Millennial Media, Inc.Idle screen advertising
US8995968Jun 17, 2013Mar 31, 2015Millennial Media, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US8995973Jun 17, 2013Mar 31, 2015Millennial Media, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US9032219 *Nov 16, 2012May 12, 2015Nuance Communications, Inc.Securing speech recognition data
US9058406Oct 29, 2012Jun 16, 2015Millennial Media, Inc.Management of multiple advertising inventories using a monetization platform
US9065593Nov 16, 2012Jun 23, 2015Nuance Communications, Inc.Securing speech recognition data
US9076175May 10, 2006Jul 7, 2015Millennial Media, Inc.Mobile comparison shopping
US9082076Sep 29, 2014Jul 14, 2015Accenture Global Services LimitedData quality management for profiling, linking, cleansing, and migrating data
US9083750Jul 15, 2013Jul 14, 2015Sap SeMethod and system for authentication by defining a demanded level of security
US9110903Nov 22, 2006Aug 18, 2015Yahoo! Inc.Method, system and apparatus for using user profile electronic device data in media delivery
US9110996Feb 17, 2014Aug 18, 2015Millennial Media, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US9131369Jan 24, 2013Sep 8, 2015Nuance Communications, Inc.Protection of private information in a client/server automatic speech recognition system
US9158794May 24, 2013Oct 13, 2015Google Inc.System and method for presentation of media related to a context
US9195993Oct 14, 2013Nov 24, 2015Millennial Media, Inc.Mobile advertisement syndication
US9197626Dec 30, 2014Nov 24, 2015Facebook, Inc.Leveraging a persistent connection to access a secured service
US9197627 *Dec 30, 2014Nov 24, 2015Facebook, Inc.Leveraging a persistent connection to access a secured service
US9201979Mar 9, 2009Dec 1, 2015Millennial Media, Inc.Syndication of a behavioral profile associated with an availability condition using a monetization platform
US9223878 *Jul 31, 2009Dec 29, 2015Millenial Media, Inc.User characteristic influenced search results
US9224172Dec 2, 2008Dec 29, 2015Yahoo! Inc.Customizable content for distribution in social networks
US9235728Feb 16, 2012Jan 12, 2016Csidentity CorporationSystem and methods for identifying compromised personally identifiable information on the internet
US9237152Jun 14, 2014Jan 12, 2016Csidentity CorporationSystems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository
US9271023Mar 31, 2014Feb 23, 2016Millennial Media, Inc.Presentation of search results to mobile devices based on television viewing history
US9384500Jul 7, 2014Jul 5, 2016Millennial Media, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US9386150Nov 11, 2013Jul 5, 2016Millennia Media, Inc.Presentation of sponsored content on mobile device based on transaction event
US9390436Aug 4, 2014Jul 12, 2016Millennial Media, Inc.System for targeting advertising content to a plurality of mobile communication facilities
US20020187772 *Feb 26, 2002Dec 12, 2002Petri HyyppaElectronic transactions
US20030014509 *Jul 16, 2001Jan 16, 2003Jurado Anthony J.Account management module user interface
US20030041065 *Oct 22, 2001Feb 27, 2003Mark LucovskySchema-based services for identity-based access to contacts data
US20030050911 *Oct 22, 2001Mar 13, 2003Mark LucovskySchema-based services for identity-based access to profile data
US20030061365 *Oct 22, 2001Mar 27, 2003Microsoft CorporationService-to-service communication for network services
US20030069887 *Oct 22, 2001Apr 10, 2003Lucovsky Mark H.Schema-based services for identity-based access to inbox data
US20030225860 *Jun 4, 2002Dec 4, 2003Courtemanche Paul R.Life-event server
US20040262403 *Mar 19, 2004Dec 30, 2004Morgan Carroll H.Emergency identification pouch with DNA source specimen
US20050028168 *Jun 26, 2003Feb 3, 2005Cezary MarcjanSharing computer objects with associations
US20050060493 *Sep 11, 2003Mar 17, 2005International Business Machines CorporationNegotiated distribution of cache content
US20050060497 *Sep 11, 2003Mar 17, 2005International Business Machines CorporationSelectively accepting cache content
US20050273692 *Aug 12, 2005Dec 8, 2005Microsoft CorporationSchemas for a notification platform and related information services
US20050278366 *Aug 12, 2005Dec 15, 2005Microsoft CorporationSchemas for a notification platform and related information services
US20060064436 *Aug 12, 2005Mar 23, 2006Fowler James FContact information marketplace
US20060111975 *Aug 12, 2005May 25, 2006Fowler James FSystem to solicit unknown corporate data
US20060116896 *Aug 12, 2005Jun 1, 2006Fowler James FUser-maintained contact information data system
US20060150140 *Feb 3, 2006Jul 6, 2006Microsoft CorporationExecuting dynamically assigned functions while providing services
US20060155750 *Aug 12, 2005Jul 13, 2006Fowler James FSystem to generate unpublished corporate data
US20060168137 *Dec 7, 2005Jul 27, 2006Samsung Electronics Co., Ltd.Service providing method using profile information and system thereof
US20070060173 *Nov 14, 2005Mar 15, 2007Jorey RamerManaging sponsored content based on transaction history
US20070061197 *Nov 14, 2005Mar 15, 2007Jorey RamerPresentation of sponsored content on mobile communication facilities
US20070061244 *May 8, 2006Mar 15, 2007Jorey RamerIncreasing mobile interactivity
US20070061246 *May 16, 2006Mar 15, 2007Jorey RamerMobile campaign creation
US20070061333 *Jan 19, 2006Mar 15, 2007Jorey RamerUser transaction history influenced search results
US20070100806 *Oct 27, 2006May 3, 2007Jorey RamerClient libraries for mobile content
US20070179985 *Jul 21, 2006Aug 2, 2007Michael KnowlesMethod for detecting state changes between data stored in a first computing device and data retrieved from a second computing device
US20070180125 *Jul 21, 2006Aug 2, 2007Michael KnowlesSecure method of synchronizing cache contents of a mobile browser with a server
US20070198634 *Jul 21, 2006Aug 23, 2007Michael KnowlesMethod for training a server for content delivery based on communication of state information from a mobile device browser
US20070198715 *Jul 21, 2006Aug 23, 2007Michael KnowlesSystem and method for communicating state management between a browser user-agent and a server
US20070198716 *Jul 21, 2006Aug 23, 2007Michael KnowlesMethod of controlling delivery of multi-part content from an origin server to a mobile device browser via a server
US20080117201 *Nov 22, 2006May 22, 2008Ronald MartinezMethods, Systems and Apparatus for Delivery of Media
US20080117202 *Nov 22, 2006May 22, 2008Ronald MartinezMethods, Systems and Apparatus for Delivery of Media
US20080120308 *Nov 22, 2006May 22, 2008Ronald MartinezMethods, Systems and Apparatus for Delivery of Media
US20080126961 *Nov 6, 2006May 29, 2008Yahoo! Inc.Context server for associating information based on context
US20080141339 *Sep 21, 2007Jun 12, 2008Sap AgMethod and system for authentication
US20080162686 *Dec 28, 2006Jul 3, 2008Yahoo! Inc.Methods and systems for pre-caching information on a mobile computing device
US20080205655 *May 7, 2008Aug 28, 2008Syncup CorporationContact management system and method
US20080214148 *Oct 30, 2007Sep 4, 2008Jorey RamerTargeting mobile sponsored content within a social network
US20080214152 *Oct 30, 2007Sep 4, 2008Jorey RamerMethods and systems of mobile dynamic content presentation
US20080214153 *Oct 30, 2007Sep 4, 2008Jorey RamerMobile User Profile Creation based on User Browse Behaviors
US20080214154 *Oct 30, 2007Sep 4, 2008Jorey RamerAssociating mobile and non mobile web content
US20080214155 *Oct 30, 2007Sep 4, 2008Jorey RamerIntegrating subscription content into mobile search results
US20080214162 *Oct 30, 2007Sep 4, 2008Jorey RamerRealtime surveying within mobile sponsored content
US20080214204 *Oct 30, 2007Sep 4, 2008Jorey RamerSimilarity based location mapping of mobile comm facility users
US20080215557 *Oct 30, 2007Sep 4, 2008Jorey RamerMethods and systems of mobile query classification
US20080242279 *May 2, 2008Oct 2, 2008Jorey RamerBehavior-based mobile content placement on a mobile communication facility
US20080263625 *Nov 30, 2007Oct 23, 2008Sap AgMethod and system for access control using resource filters
US20080270220 *Oct 30, 2007Oct 30, 2008Jorey RamerEmbedding a nonsponsored mobile content within a sponsored mobile content
US20090024452 *Sep 25, 2008Jan 22, 2009Ronald MartinezMethods, systems and apparatus for delivery of media
US20090030910 *Jul 25, 2007Jan 29, 2009Stephen BennettInformation storage and management system and method for automating online requests and transactions
US20090150501 *Sep 24, 2008Jun 11, 2009Marc Eliot DavisSystem and method for conditional delivery of messages
US20090150514 *Dec 10, 2007Jun 11, 2009Yahoo! Inc.System and method for contextual addressing of communications on a network
US20090165022 *Dec 19, 2007Jun 25, 2009Mark Hunter MadsenSystem and method for scheduling electronic events
US20090176509 *Jan 4, 2008Jul 9, 2009Davis Marc EInterest mapping system
US20090177484 *Jun 24, 2008Jul 9, 2009Marc Eliot DavisSystem and method for message clustering
US20090177644 *Jan 4, 2008Jul 9, 2009Ronald MartinezSystems and methods of mapping attention
US20090182631 *Jul 16, 2009Yahoo! Inc.System and method for word-of-mouth advertising
US20090222304 *Mar 3, 2008Sep 3, 2009Yahoo! Inc.Method and Apparatus for Social Network Marketing with Advocate Referral
US20090222329 *Mar 9, 2009Sep 3, 2009Jorey RamerSyndication of a behavioral profile associated with an availability condition using a monetization platform
US20090240586 *Mar 9, 2009Sep 24, 2009Jorey RamerRevenue models associated with syndication of a behavioral profile using a monetization platform
US20090248738 *Mar 31, 2008Oct 1, 2009Ronald MartinezSystem and method for modeling relationships between entities
US20090326800 *Jun 27, 2008Dec 31, 2009Yahoo! Inc.System and method for determination and display of personalized distance
US20090328087 *Jun 27, 2008Dec 31, 2009Yahoo! Inc.System and method for location based media delivery
US20100027527 *Feb 4, 2010Yahoo! Inc.System and method for improved mapping and routing
US20100030870 *Feb 4, 2010Yahoo! Inc.Region and duration uniform resource identifiers (uri) for media objects
US20100049702 *Aug 21, 2008Feb 25, 2010Yahoo! Inc.System and method for context enhanced messaging
US20100057801 *Mar 4, 2010Jorey RamerUser Characteristic Influenced Search Results
US20100063993 *Sep 8, 2008Mar 11, 2010Yahoo! Inc.System and method for socially aware identity manager
US20100077017 *Sep 19, 2008Mar 25, 2010Yahoo! Inc.System and method for distributing media related to a location
US20100082430 *Oct 9, 2009Apr 1, 2010Jorey RamerManaging sponsored content based on device characteristics
US20100082688 *Sep 30, 2008Apr 1, 2010Yahoo! Inc.System and method for reporting and analysis of media consumption data
US20100083169 *Sep 30, 2008Apr 1, 2010Athellina AthsaniSystem and method for context enhanced mapping within a user interface
US20100094381 *Jun 4, 2009Apr 15, 2010Electronics And Telecommunications Research InstituteApparatus for driving artificial retina using medium-range wireless power transmission technique
US20100125604 *Nov 18, 2008May 20, 2010Yahoo, Inc.System and method for url based query for retrieving data related to a context
US20100131520 *Nov 21, 2008May 27, 2010Sap AgMethod of representing an xml schema definition and data within a relational database management system using a reusable custom-defined nestable compound data type
US20100145804 *Feb 9, 2010Jun 10, 2010Jorey RamerManaging Sponsored Content Based on Usage History
US20100145976 *Dec 5, 2008Jun 10, 2010Yahoo! Inc.System and method for context based query augmentation
US20100153208 *Feb 11, 2010Jun 17, 2010Jorey RamerManaging Sponsored Content Based on Usage History
US20100161600 *Dec 19, 2008Jun 24, 2010Yahoo! Inc.System and method for automated service recommendations
US20100185517 *Jan 21, 2009Jul 22, 2010Yahoo! Inc.User interface for interest-based targeted marketing
US20100187306 *Mar 5, 2010Jul 29, 2010Worthwhile ProductsInventory control system
US20100198681 *Apr 16, 2010Aug 5, 2010Jumptap, Inc.Dynamic bidding and expected value
US20100211458 *Apr 30, 2010Aug 19, 2010Jorey RamerPresentation of Sponsored Content Based on Mobile Transaction Event
US20100217663 *Apr 30, 2010Aug 26, 2010Jumptap, Inc.Mobile Content Cross-Inventory Yield Optimization
US20100228582 *Mar 6, 2009Sep 9, 2010Yahoo! Inc.System and method for contextual advertising based on status messages
US20100262837 *Apr 13, 2010Oct 14, 2010Haluk KulinSystems And Methods For Personal Digital Data Ownership And Vaulting
US20100269154 *Oct 21, 2010Research In Motion LimitedMethod of communciating state information between a server and a mobile device browser with version handling
US20100280879 *Nov 4, 2010Yahoo! Inc.Gift incentive engine
US20100293051 *Jul 30, 2010Nov 18, 2010Jumptap, Inc.Mobile Advertisement Syndication
US20110015993 *Sep 24, 2010Jan 20, 2011Jumptap, Inc.Managing Sponsored Content Based on Usage History
US20110029378 *Feb 3, 2011Jumptap, Inc.User Profile-Based Presentation of Sponsored Mobile Content
US20110035265 *Aug 6, 2009Feb 10, 2011Yahoo! Inc.System and method for verified monetization of commercial campaigns
US20110153614 *Jun 23, 2011Worthwhile ProductsInventory control system process
US20110167082 *Jul 7, 2011Nokia CorporationElectronic transactions
US20120078938 *Mar 29, 2012Yahoo! Inc.System and method for context based query augmentation
US20120210131 *Apr 24, 2012Aug 16, 2012Research In Motion LimitedSecure method of synchronizing cache contents of a mobile browser with a server
US20120260316 *Apr 23, 2012Oct 11, 2012Aol Inc.Leveraging a Persistent Connection to Access a Secured Service
US20130103485 *Oct 19, 2011Apr 25, 2013Richard PostrelMethod and system for providing consumers with control over usage of the consumer' s data and rewards associated therewith
US20130174226 *Sep 15, 2012Jul 4, 2013Robert Bruce HirshLeveraging a persistent connection to access a secured service
US20140143550 *Nov 16, 2012May 22, 2014Nuance Cornmunications, Inc.Securing speech recognition data
US20150072616 *Nov 12, 2014Mar 12, 2015Huawei Technologies Co., Ltd.Method for Distributing Virtual User Identification Data, Method for Acquiring Virtual User Identification Data, and Device
WO2011109655A1 *Mar 3, 2011Sep 9, 2011Worthwhile ProductsInventory control system process
WO2013059543A1 *Oct 19, 2012Apr 25, 2013Signature Systems LlcMethod and system for providing consumers with control over usage of the consumer's data and rewards associated therewith
Classifications
U.S. Classification1/1, 707/999.1
International ClassificationH04L29/08, H04L29/06
Cooperative ClassificationH04L29/06, G06F21/6218, Y10S707/99939, H04L63/105, H04L63/0428, H04L63/08, H04L69/329, H04L67/306
European ClassificationH04L63/10D, H04L63/04B, H04L29/06, H04L29/08N29U