US20090210293A1 - Information transactions over a network - Google Patents
- ️Thu Aug 20 2009
US20090210293A1 - Information transactions over a network - Google Patents
Information transactions over a network Download PDFInfo
-
Publication number
- US20090210293A1 US20090210293A1 US12/434,803 US43480309A US2009210293A1 US 20090210293 A1 US20090210293 A1 US 20090210293A1 US 43480309 A US43480309 A US 43480309A US 2009210293 A1 US2009210293 A1 US 2009210293A1 Authority
- US
- United States Prior art keywords
- information
- consumer
- account
- vendor
- exchange Prior art date
- 2000-08-04 Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 118
- 230000004044 response Effects 0.000 claims description 27
- 230000008569 process Effects 0.000 claims description 26
- 238000004891 communication Methods 0.000 claims description 23
- 238000012545 processing Methods 0.000 claims description 22
- 238000007726 management method Methods 0.000 claims description 18
- 238000000605 extraction Methods 0.000 claims description 10
- 239000000344 soap Substances 0.000 claims description 10
- 230000007246 mechanism Effects 0.000 claims description 9
- 238000013475 authorization Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 4
- 230000000694 effects Effects 0.000 claims description 4
- 230000009466 transformation Effects 0.000 claims description 4
- 230000001413 cellular effect Effects 0.000 claims description 3
- 238000013523 data management Methods 0.000 claims description 2
- 239000000047 product Substances 0.000 description 44
- 230000003993 interaction Effects 0.000 description 24
- 238000010586 diagram Methods 0.000 description 15
- 238000001914 filtration Methods 0.000 description 5
- 235000013532 brandy Nutrition 0.000 description 4
- 238000009826 distribution Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 238000007792 addition Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 239000006227 byproduct Substances 0.000 description 2
- 229920001690 polydopamine Polymers 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000002062 proliferating effect Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
- 230000005641 tunneling Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0201—Market modelling; Market analysis; Collecting market data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/252—Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/284—Relational databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/04—Billing or invoicing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Definitions
- FIG. 1 is a high-level block diagram illustrating a system in accordance with one or more exemplary embodiments as disclosed herein.
- FIG. 2 is an abstract illustration of an information account in accordance with exemplary embodiments as may be used, for example, in the system illustrated in FIG. 1 .
- FIG. 3 is an abstract illustration of another information account in accordance with other exemplary embodiments as may be used, for example, in the system illustrated in FIG. 1 .
- FIG. 4 is an abstract illustration of an exemplary database schema in accordance with certain exemplary embodiments.
- FIG. 5 is a generalized interaction diagram illustrating the interaction between various system components of certain exemplary embodiments as disclosed herein.
- FIG. 6 is a generalized interaction diagram illustrating the interaction between various system components when a new information account is created by a consumer via a vendor's website, in accordance with one or more exemplary embodiments.
- FIG. 7 is a generalized interaction diagram illustrating the interaction between various system components in an exemplary wireless environment.
- FIG. 8 is a high-level block diagram illustrating logical grouping of vendor servers into exchanges in accordance with one or more exemplary embodiments as disclosed herein.
- FIG. 9 is an illustration of a web page displaying logos that identify a branded information account and exchange membership in accordance with one or more exemplary embodiments as disclosed herein.
- FIG. 10 is an abstract illustration of exemplary system components for implementing revenue sharing models in accordance with certain exemplary embodiments.
- a system and method are provided for enabling consumers to store and maintain a comprehensive information profile (hereinafter “information account”) in a centralized data repository that is accessible over a distributed electronic network, such as the Internet.
- the information account may be used to store any type of data desired by the consumer, including, for example, demographic information, financial information, medical information, family information, contact information, documents, image files, multimedia files, etc.
- the centralized data repository is preferably accessible via a network by any authorized network device. In various embodiments, no specialized application programs are required to be permanently downloaded to the consumer's network device in order to access the information account.
- selected information in the information account may be accessed and, if desired, shared with authorized vendors, business partners or any other entity that requires certain of the consumer's information.
- vendor and “business partner” are used herein in a general sense to refer to persons, businesses, enterprises or entities that make products or services available to consumers.
- consumer the terms “consumer,” “buyer,” and “user” are interchangeable.
- Server-side software or temporary client-side software may, in some embodiments, be used to manage communications with the information account and to automatically integrate that consumer information into a process executed by a network device.
- the network device may execute a business process relating to a consumer-initiated activity, such as a retail transaction.
- the server-side software or temporary client-side software may receive consumer information from the information account and use that information to automatically populate the input fields of a form or the input requirements of a process that is to be submitted to a vendor's server or other network device during an application, registration or transaction process.
- the data in the information account is preferably stored using a tagged data format.
- the data in the information account may be stored using the eXtensible Markup Language (“XML”) data format, which is an open standard for describing data from the World Wide Web Consortium (“W3C”).
- XML tags are used to define the types of information that are represented by the data element.
- the XML standard provides a great deal of flexibility in that custom tags may be defined for any type of information that the consumer may desire to store in the information account.
- XML-related querying, parsing, transforming and/or filtering techniques individual data elements in the information account may be accessed, updated, deleted, created, or otherwise manipulated.
- the information account may be structured as one or more data aggregates, e.g., XML data aggregates.
- An entire XML data aggregate is stored within a data field of a database table. This data field is a long text field containing all of the information associated with the given record.
- all consumer information in the information account may be stored in a single XML data aggregate comprising consumer information elements and sub-elements. Attributes may also be associated with any element and sub-element in order to provide additional information.
- a transformation or filtering mechanism such as “Style Sheets,” may be applied to the single XML data stream in order to extract only selected data elements therefrom at the direction of the consumer.
- the information account may be normalized into a plurality of discrete data aggregates, each aggregate representing a predetermined “information product.”
- An information product refers to a package of consumer information relating to a specific product or service offered by a vendor.
- a mortgage information product might contain all consumer information that would be required to complete a lender's mortgage application.
- Individual information products may be retrieved from the information account and transmitted to authorized vendors at the request of the consumer.
- Access constraints may be utilized in one or more embodiments as described herein to allow for the establishment of “exchanges.”
- An exchange generally refers to a group of entities that are authorized to accept consumer information from the information account at the request of the consumer.
- the information account may be accessed for retrieval of information to be used in commerce with any vendor or entity that is a member of the exchange.
- the consumer may have several information accounts that are each valid only on specified exchanges.
- Exchanges may be implemented, for example, through “inflow” and/or “outflow” constraints imposed by the exchanges.
- An inflow constraint imposed by an exchange may, for example, dictate that only information accounts associated with specific other exchanges will be accepted or that no information accounts associated with other exchanges will be accepted.
- An outflow constraint may dictate that information accounts associated with an exchange may only be used within that exchange and within no other exchanges.
- Revenue sharing models may be established in order to provide financial incentives to exchanges and/or individual vendors that facilitate the creation of an information account or the use of an information account to complete a transaction.
- FIG. 1 A high-level block diagram of a system in accordance with an exemplary embodiment is shown in and described with reference to FIG. 1 .
- a central data repository 102 is provided for storing consumer information that may be easily accessed from any network device attached to the network 106 .
- the network 106 may comprise any telecommunication and/or data network, whether public or private, such as a local area network, a wide area network, an intranet, an internet and any combination thereof and may be wireline and/or wireless.
- Various methodologies as described herein may be practiced in the context of distributed computing environments.
- the network 106 thus provides for the open and seamless distribution of consumer information to and from the information account 110 .
- a network device may generally comprise any device that is capable of communicating with the resources of the network 106 .
- a network device may comprise, for example, a network server 108 & 114 , a client device 104 , a wireless client device 104 a or a dedicated storage device (e.g., the central data repository 102 .)
- a host server 108 hosts the software for interacting with the central data repository 102 and for communicating with other network devices.
- the host server 108 may interact with the central data repository 102 via the network 106 or via a direct communication link 111 .
- a vendor server 114 hosts vendor web page files 116 comprising a vendor website, through which products or services may be offered to consumers.
- the description of exemplary embodiments with reference to FIG. 1 assumes the existence of a previously created information account 110 .
- An example illustrating actual creation of an information account 110 will be described below with reference to FIG. 6 .
- the information account 110 may be any data structure for storing consumer information.
- the information account 110 is stored as a tagged data structure, such as one or more XML data aggregates.
- the data in the information account 110 is preferably encrypted so that anyone gaining unauthorized access to the information account 110 will not be able to read the data.
- each information account 110 in the central data repository 102 is encrypted separately, so that someone authorized to access the information account of one consumer may not also gain access to the information account of another consumer.
- the consumers may maintain sole responsibility for storing and updating the information in the information account 110 . Only the consumer, or those authorized by the consumer, may use the information account 110 to complete e-commerce or m-commerce activities. Consumers create an information account 110 either through a website hosted by the host server 108 or a website hosted by a vendor server 114 . For example, after manually completing a form displayed by a vendor's website, the consumer can choose to create an information account 110 and have the consumer information stored therein.
- a consumer may be given an identification number, a username and/or a password.
- Other types of consumer authentication information are known in the art and may also be used in the context of the present invention.
- the system of FIG. 1 provides the consumer with a variety of methods of accessing the information account 110 , transferring selected information to a vendor and/or allowing a vendor limited and constrained access to the information account 110 , as described in further detail herein.
- a single sign-on mechanism may be provided to allow a consumer to “sign-on” (provide username and password, etc.) for authentication to access an information account 110 at only a first website. The authentication status may then “follow” the consumer as the consumer accesses subsequent websites. At such subsequent websites, a consumer who has activated the single sign-on mechanism will not be asked to re-authenticate himself.
- the host server 108 may maintain an authentication table (not shown) that records the consumer authenticatic information, the sign-on time and a browser identifier.
- the client-side application 105 may communicate the browser identifier to the host server 108 .
- the host server 108 may use the browser identifier to look up the consumer authentication information and previous sign-on time in the authentication table. The previous sign-on time may be compared to the current time in order to determine whether a time-out interval has expired. If the time-out interval has not expired, the host server 108 may acknowledge that the consumer is authenticated.
- the client-side application 105 is specific to the browser session only and not to the client device 104 . Multiple client-side applications 105 may be executed at the same time if multiple browser windows are executed by the client device 104 .
- the client-side application 105 provides functionality for facilitating communications between the browser 112 executed by the client device 104 and the database management system (“DBMS”) 109 of the host server 108 .
- DBMS database management system
- One responsibility of the client-side application 105 is to provide authentication information associated with the consumer and the vendor to the host server 108 .
- authentication information may comprise a username, user ID, password, key, certificate and the like.
- Authentication information regarding the vendor may be embedded within the web page file 116 for extraction by the client-side application 105 .
- the client-side application 105 may communicate with the vendor server 114 to retrieve such vendor authentication information.
- Authentication information regarding the consumer may be supplied by the consumer via a user interface displayed by the client-side application 105 .
- Communications relating to authentication information may be accomplished using a secure transmission protocol or handshake, such as the secure shell BSD, Point to Point Tunneling Protocol (PPTP), also commonly know as Virtual Private Network, and/or secure socket layering (SSL) protocol.
- PPTP Point to Point Tunneling Protocol
- SSL secure socket layering
- Other methods for achieving a secure connection over the network 106 will be apparent to those of ordinary skill in the art.
- Authentication information may also be encrypted and transmitted over an open network using any appropriate protocol.
- the client-side application 105 is also responsible for determining the type of consumer information that is required by the input fields of the displayed web page file 116 . After determining the type of consumer information that is required, the client-side application 105 may formulate a database query in a language that is understood by the DBMS 109 . At a minimum, client-side application 105 communicates enough information to the DBMS 109 regarding the required consumer information so that the DBMS can formulate a database query. In one embodiment, the DBMS 109 exposes an application program interface (“API”) that can be utilized by the client-side application 105 . An example of one such API is known as the Simple Object Access Protocol (“SOAP”).
- SOAP Simple Object Access Protocol
- SOAP is a protocol that provides for interoperability between heterogeneous HTTP-based software and XML-based software.
- SOAP provides access to services, objects, and servers in a platform-independent manner. Since SOAP relies on HTTP as the transport mechanism, and most firewalls allow HTTP to pass through, SOAP endpoints may usually be invoked from either side of a firewall.
- the client-side application 105 may transmit the database query (or information to form the database query) to the host server 108 along with the above-mentioned authentication information over a secure connection.
- the authentication information and the query information may be passed to the DBMS 109 .
- the DBMS 109 attempts to authenticate the vendor and the consumer using the authentication information and corresponding information that was previously stored in the data repository 102 . If authentication is successful, the DBMS 109 queries the information account 110 using the appropriate database connectivity protocol, such as the Open Database Connectivity (“ODBC”) protocol, the Java Database Connectivity Protocol (“JDBC”), or any other suitable protocol.
- ODBC Open Database Connectivity
- JDBC Java Database Connectivity Protocol
- the data in the information account 110 may be encrypted.
- the DBMS 109 may receive an encrypted search result.
- the search result for example, may be in the form of a stream of XML data that has been filtered from the information account.
- the DBMS 109 or other program module executed by the host server 108 may be responsible for decrypting the search result.
- the decrypted search results may then be transmitted to the client-side application 105 via the previously established or a new secure connection.
- the client-side application 105 may also be responsible for parsing the data elements included in the search result and auto-populating the parsed data into the input fields of the displayed web page file 116 . Again, the client-side application 105 may translate the XML data into HTTP data using SOAP or another suitable protocol. Those skilled in the art will appreciate that in certain embodiments, especially where user verification of the consumer information is not required, the client-side application 105 may transmit the consumer information directly to the vendor server 114 without populating the consumer information into the displayed web page file 116 . If the input fields are auto-populated, the consumer has the opportunity to verify the information displayed in the input fields, make any necessary modifications, and then interact with the displayed web page file 116 to submit the information to the vendor server 114 .
- a server-side application 107 may be employed instead of a client-side application 105 to manage communications with the host server 108 .
- An authorized server-side application 107 may receive consumer information directly from the host server 108 and present that consumer information to the client device 104 (e.g., via the browser 112 ) for display to the consumer.
- a web page file 116 hosted by the vendor server 114 may be accessed and displayed by the browser 112 of the client device 104 .
- the displayed web page file 116 may present a user interface for input of consumer authentication information.
- the consumer authentication information is transmitted from the client device 104 to the host server 108 for authentication of the consumer.
- the client device 104 may also transmit a request that a “ticket” be provided to the vendor server 114 .
- ticket refers to a temporary authorization for at least partial access to a consumer's information account 110 .
- an information account 110 may be associated with a data table or other data structure that correlates one or more tickets with a set of consumer-defined attributes.
- the consumer-defined attributes may determine such things as the number of times that the password may be used to access the information account 110 (e.g., one-time use), any period of validity associated with the ticket (e.g., ticket expires one week from issuance), whether the ticket carries read, write and/or modify privileges, etc.
- the ticket attributes may also include any number of identifiers, such as a vendor identifier, a data identifier, and filter identifiers, which may be used to ensure that the party using the ticket is in fact authorized to do so, and to ensure that only authorized data is filtered for release to that party.
- identifiers such as a vendor identifier, a data identifier, and filter identifiers, which may be used to ensure that the party using the ticket is in fact authorized to do so, and to ensure that only authorized data is filtered for release to that party.
- the host server 108 may redirect the browser 112 of the client device 104 to another web page data file 116 (e.g., another web page data file 116 hosted by of the vendor server 114 ), including the ticket as a parameter in the URL.
- the vendor server may extract the ticket and pass it to the server-side application 107 .
- the server-side application 107 may then use the ticket to authenticate itself to the host server 108 , for example using SOAP or another suitable protocol.
- a ticket generated by the host server 108 may be a “Globally Unique Identifier” (“GUID”).
- GUID preferably comprises a unique number that is computed by adding the time and date to a network adapter's internal serial number, or by any other suitable technique.
- the ticket may be encrypted.
- the ticket may be encrypted using the vendor's public key and the resulting binary encrypted blob may be base64 encoded such that so that it can be included as a parameter in a URL.
- the parameter may be extracted from the URL, base64 decoded and then decrypted using the vendor's private key. Other encryption techniques may also be used.
- consumer authentication information may be submitted from the client device 104 to the server-side application 107 at the vendor server 114 .
- the server-side application 107 may then transmit the consumer authentication information and vendor authentication information to the host server 108 for authentication of both the consumer and the vendor.
- the consumer authentication information may be encrypted at the client device 104 and decrypted only at the host server 108 .
- Such an embodiment places a significant amount of control over the consumer's data in the hands of the vendor, and thus may not be preferable.
- the server-side application may be identified by an application identifier (“APPID”).
- APPID application identifier
- the APPID may be associated at the host server 108 (e.g., by the DBMS 109 ) with a particular filtering mechanism.
- style sheets are well-known and highly suitable filtering tools for use in conjunction with XML data.
- consumer information may be filtered from the information account 110 and transmitted back to the server-side application 107 .
- the server-side application 107 may then parse the consumer information, for example, in order to auto-populate a form, which may or may not have been previously displayed to the consumer.
- the server-side application 107 may receive decrypted consumer information from the host server 108 via a secure connection, or may receive encrypted consumer information via the open network.
- the server-side application 107 may be configured to perform decryption as necessary.
- the consumer information thus received from the host server 108 may be presented to the consumer for verification. Any modifications or additions made to the consumer information may be submitted back to the server-side application 107 for communication to the host server 108 .
- the DBMS 109 may then update and/or create the information account 110 in the appropriate manner.
- the consumer may interact with the displayed web page file 116 to submit the consumer information to the vendor server 114 .
- the vendor server 114 may then process the consumer information, as needed, by way of a processing module.
- FIG. 1 Those skilled in the art will appreciate that the illustration and discussion of exemplary embodiments with reference to FIG. 1 is provided as a generalized example only. Specific details regarding data formats and network communication protocols have been omitted, as such details are well known in the art. Furthermore, the present invention is not intended to be limited to the use of any particular data formats or protocols. Any existing or future formats or protocols may be used without departing from the spirit and scope of the invention. Furthermore, many network components were not shown or discussed with reference to FIG. 1 , such as gateways, routers, hubs, switches, firewalls, DNS servers, authentication servers, certificate authorities, and the like. The functions and roles of such network components are also well known in the art and need not be described in detail herein.
- FIG. 2 provides an abstract illustration of an information account 110 in accordance with an exemplary embodiment as described herein.
- the consumer information is stored in the information account 110 as a single tagged (delimited) data stream.
- XML generally provides a suitable tagged data format; however, other tagged data formats can be employed as well.
- references to the XML standard in connection with exemplary embodiments are not intended to limit the scope of the present invention.
- the single XML data stream comprises a plurality of consumer information elements 202 , each having a unique tag 204 or identifier.
- a consumer information element 202 may be divided into any number and/or level of sub-elements 206 .
- an XML consumer information element 202 may also be associated with one or more attributes 208 .
- An attribute 208 may provide additional information about the content, structure or formatting of a consumer information element 202 .
- a consumer information element 202 may comprise any type of data or information, including text strings, objects, files, applications, etc. Obviously, the more consumer information that is stored in the information account 110 , the larger the XML data stream will be. The size of the XML data stream is limited only by the hardware and software limitations of the system (e.g., memory size, processor speed, bandwidth, etc).
- An information account 110 is preferably unique to a single customer.
- Each information account 110 stored in the data repository 102 may thus comprise a discrete XML data stream.
- Each information account 110 stored in the data repository 102 may be individually encrypted.
- one method for encrypting an information account 110 may involve use of the consumer's public key. Accordingly, only someone having access to the consumer's private key will be able to decrypt the consumer's information.
- Many other and/or additional methods for encrypting information accounts 110 and/or the entire data repository 102 will occur to those skilled in the art.
- a consumer information element 202 in one information account 110 may comprise a pointer or a reference to another data element or to another information account 110 .
- a consumer may create, for example, a list of business contacts.
- a new information account may be created for each individual specified as a business contact by the consumer.
- Authentication data within the new information account may be set as “anonymous” so that the first consumer may retain access privileges.
- the individual named as the business contact may be given control of the new information account by changing the associated authentication information to be unique to that individual.
- the first consumer may then be granted limited access privileges to continue to access the new information account of the business contact (e.g., by way of a ticket).
- the first consumer may retain a copy of the business contact information in his own information account.
- FIG. 3 provides an abstract illustration of an information account 110 in accordance with other exemplary embodiments of the present invention.
- an information account 110 is structured as multiple discrete XML aggregates 302 a - c .
- the discrete XML aggregates 302 a - c may comprise one primary “profile” record 302 a and one or more information product records 302 b - e .
- the profile record 302 a may include a general profile of information elements 304 associated with the consumer.
- Information product records 302 b - c contain consumer information elements that, for example, are specific to a particular product or service offered by a vendor, or that are important to vendors with similar consumer information needs. Aggregation of data elements according to information products allows quick and efficient retrieval of specific consumer information from the information account 110 through a request-response system.
- the number of aggregates or records included within the information account 110 of a given consumer depends upon the number of information products for which the consumer has elected to store information. For example, a consumer who has elected to store information about two separate products, such as a car loan and a mortgage loan, would have at least three data aggregates in his information account 110 . One such data aggregate would represent the primary profile record and each of the two other data aggregates would include information about one of the information products. Data aggregates may include but are not limited to the following information products: Home Loan, Auto Loan, Student Loan, Home Insurance, Auto Insurance, Life Insurance, Online Banking, Credit Card, Government Services, Education, Career, Travel, Retail, and Relocation.
- a new product record 302 b - c will be created in the information account.
- Each product record 302 b - c created for the consumer is of course associated with the primary profile record 302 a.
- latent referential processing is one method for maintaining data consistency, and in this context refers to the use of a series of pointers or references to flag data that is redundant across multiple products. According to latent referential processing, when a record 302 a - c is created or updated, redundant information elements that are stored in other data aggregates typically are not also updated until the next time the information account is accessed. For example, if salary information is updated in a home loan information product record, redundant salary information in the consumer's auto loan information product record will generally not be immediately updated. Thus, latent referential processing allows data inconsistencies to exist within the information account after an update.
- a transaction log (e.g., a time stamp log) may be maintained for each redundantly stored aggregate in the information account to record the date and time of the most recent update for each data record 302 a - c .
- the DBMS 109 may first examine the time stamp log to determine which data element in a set of redundant data elements has most recently been updated. After determining the most recently updated data element, all other redundant data elements are updated to be consistent with the most recently updated data element.
- the request to access the information account may be granted. Accordingly, latent referential processing is a new way of storing and tracking information that addresses the need of providing quick access to information that will be accessed more frequently than it will be updated.
- an information account 110 may be configured such that the consumer's profile record 302 a stores the majority of the consumer's personal information.
- the profile record 302 a may comprise predefined data elements, such as “first name,” “middle name,” “last name,” date of birth,” etc.
- the profile aggregate 302 a may also be expanded to include any additional and/or custom fields. Additional aggregates corresponding to information products 302 c may contain pointers 306 to the data fields within the profile aggregate 302 a .
- the information account 110 may be configured to store within one aggregate a single instance of an information element that is referenced by other aggregates. As information product aggregates 302 c are formed independently of the profile aggregate 302 a , data elements that are not unique to those information product aggregates 302 c may be ported into the profile aggregate 302 a if desired.
- FIG. 4 illustrates an exemplary database schema 400 in accordance with one or more exemplary embodiments as disclosed herein.
- the database schema 400 represents the situation where the information account 110 is segmented into multiple discrete data aggregates, as shown in FIG. 3 .
- the database schema 400 may include a consumer authentication record 402 that stores consumer authentication information 404 such as, for example, a user ID, username, password, email address, access attempts, last attempt date/time, challenge word or phrase, challenge response, ticket parameters, and vendor credited with origination of the information account. These and other types of authentication information may be used to authenticate a consumer.
- the database schema 400 may also include a profile record 302 a that stores a primary information profile 304 of the consumer.
- the exemplary database schema 400 also includes one or more information product records 302 b - c that store product-specific information. Each profile record 302 a may be associated with one or many information product records 302 b - c.
- the profile record 302 a and each information product record 302 b - c may further be associated with a transaction log record 406 .
- Transaction information 408 may provide the basis for all transaction billing and revenue sharing events.
- the transaction record 406 may identify the vendor server through which the information account 110 was created.
- the transaction record 406 may also identify the vendor server through which a transaction was completed using the information account 110 .
- transaction refers broadly to any activity related to an information account, including, but not limited to a create transaction, delete transaction, update transaction, authentication transaction, a request for information from authorized vendors, a client device and/or vendor server 114 request, a publishing and form filling transaction, and a submit transaction where the information account 110 is processed into the requesting vendors systems.
- a portion of any monies billed upon completion of a transaction may be shared with each of the vendor servers identified in the transaction record 406 .
- FIG. 5 is a generalized interaction diagram illustrating the interaction between various system components of certain exemplary embodiments in connection with consumer-controlled storing, managing and/or distributing information.
- the exemplary embodiments discussed with reference to FIG. 5 employ a client-side application 105 , such as an applet, to manage communication between the client device 104 and the host server 108 .
- Alternative embodiments employing a server-side application 107 instead of the client-side application 105 have been discussed above. Those skilled in the art will appreciate the differences between the interactions involving a client-side application 105 and a server-side application 107 .
- the generalized interaction diagram begins at step 501 , where the consumer operates a browser 112 to retrieve a web page file 116 from the vendor server 114 via the network 106 , using a consumer browser.
- the web page file 116 retrieved from the vendor server 114 may be enabled for interaction with the consumer's information account 110 and may thus include an instruction that causes the browser 112 to download a client-side application from the host server 108 .
- the client-side application is downloaded from the host server 108 to the browser 112 .
- the consumer interacts with the browser 112 to request use of the information account 110 , which in this example has already been created.
- the web page file 116 may display a selectable icon or other indicia that allows the consumer to request use of the information account 110 .
- the client-side application 105 may provide the interface for requesting use of the information account 110 .
- the client-side application 105 displays a login interface to the consumer.
- the login interface may be displayed, for example, in the open display window of the browser 112 , in a pop-up window, or in any other suitable manner.
- the consumer inputs consumer authentication information, which is transferred from the browser to the client-side application 105 .
- Consumer authentication information may comprise, for example, a username, user ID, password, challenge phrase, email address, etc.
- the user authentication information is combined with vendor authentication information and is sent to the DBMS 109 .
- Vendor authentication information may comprise a vendor ID, password, product IP, application ID, and the like. Vendor authentication information may be used to authenticate the vendor and to determine the manner in which consumer information is to be filtered from the information account 110 .
- the DBMS 109 After the DBMS 109 receives the authentication information, it submits an authentication request to the data repository 102 at step 512 .
- the authentication request may be a database query to determine if the supplied consumer authentication information and vendor authentication information are consistent with previously stored authentication information.
- the DBMS 109 performs one or more database queries at step 514 to retrieve consumer information elements from the information account 110 .
- the DBMS 109 may retrieve certain products (identified by product ID) from the information account 110 , or may retrieve a set of data elements filtered according to a vendor ID or an application ID.
- LWT iterative lightweight transfer
- the consumer information elements may be merged (if appropriate) decrypted (if appropriate) and/or further filtered (if appropriate) at step 518 .
- the resulting information elements are transmitted to the client-side application 105 , for example in the form of an XML data stream.
- the client-side application 105 parses the received XML data and transforms it into the required format for populating the input fields of the displayed web page file 116 .
- the client-side application 105 then auto-populates the input fields of the displayed web-page file 116 at step 524 .
- the consumer may interact with the browser 112 to edit or modify the auto-populated information at step 526 .
- steps 524 and 526 are repeated until all data has been auto-populated and/or edited on every included web page.
- the client-side application 105 monitors the edit process to determine if the consumer desires to modify and/or supplement any of the consumer information elements.
- the consumer may then interact with the browser 112 at step 528 in order to submit the consumer information that has been entered into the displayed web page file(s) 116 to the vendor server 114 .
- the vendor server 114 receives and processes the consumer information elements at step 530 . After processing the consumer information, the vendor server 114 preferably transmits a “success page” or other acknowledgement to the consumer's browser 112 at step 532 .
- Update is an event whereby the information account 110 is updated to reflect any edits that the consumer may have made to the consumer information at step 526 .
- a consumer is permitted to update the information account 110 via a vendor's website.
- the consumer may elect to update the information account 110 at a later time directly via the host server 108 .
- the client-side application submits the consumer's XML data (possibly only the edited data) and the update request to the DBMS 109 .
- the update request is submitted to the data repository for authentication.
- consumer authentication information, vendor authentication information and, if appropriate, product identification information are verified.
- the XML data is validated at step 540 and the update is performed at step 542 .
- the DBMS then sends the update result (success or failure) to the client-side application 105 at step 544 , which in turn displays the update result to the browser 112 at step 546 .
- the exemplary generalized interaction diagram then ends at step 548 .
- FIG. 6 is a generalized interaction diagram illustrating the interaction between main system components when a new information account is created by a consumer via a vendor's website.
- the consumer may create an information account by visiting a vendor's website that has been configured to allow creation of an information account.
- the vendor's website may, for example, require the user to manually input consumer information into the input fields of a form. The user may then direct that an information account be created to store the consumer information, so that the consumer will not be required to manually enter the consumer information again on any participating website.
- the exemplary interaction diagram of FIG. 6 begins at step 601 , where the consumer operates a browser 112 to retrieve a web page file 116 from the vendor server 114 via the network 106 , using a consumer browser.
- the web page file 116 retrieved from the vendor server 114 may be enabled for interaction with the consumer's information account 110 and may thus include an instruction that causes the browser 112 to download a client-side application from the host server 108 .
- the client-side application is downloaded from the host server 108 to the browser 112 .
- the consumer interacts with the browser 112 to input consumer information into the input fields of the vendor's website.
- the client-side application 105 monitors the input of consumer information at step 606 .
- the consumer interacts with the browser 112 in order to submit the consumer information to the vendor server 114 .
- the vendor server 114 receives and processes the consumer information elements at step 610 .
- the vendor server 114 transmits a “success page” or other acknowledgement to the consumer's browser 112 at step 612 .
- the consumer may interact with the browser 112 at step 614 to submit a request for creation of an information account 110 to the DBMS 109 .
- the consumer may be permitted to create an information account 110 via a vendor's website.
- the consumer may elect to create an information account 110 at a later time directly via the host server 108 .
- the client-side application submits the consumer's XML data and the create request to the host server 108 .
- the host server 108 transmits an information account creation interface to the browser 112 .
- the consumer inputs consumer authentication information via the information account creation interface at step 622 and the browser 112 passes the create request (which may include the consumer authentication information, the vendor authentication information, etc.) to the client-side application 105 at step 624 .
- the create request is combined with the consumer's XML data and is sent to the DBMS 109 .
- the DBMS 109 submits an authentication request to the data repository 102 at step 628 .
- the authentication request may be a database query to determine if the supplied consumer authentication information and vendor authentication information are consistent with previously stored authentication information.
- the DBMS 109 validates the consumer's XML data at step 630 and creates a new information account 110 at step 632 .
- the DBMS 109 sends the create result (success or failure) to the client-side application 105 at step 634 , which in turn displays the create result to the browser 112 at step 636 .
- the host server 108 creates an acknowledgment email to be sent to the consumer's email account.
- the host server requests and receives the consumer's email address from the DBMS 109 .
- the consumer's acknowledgment email is delivered to the consumer.
- the exemplary generalized interaction diagram then ends at step 644 .
- FIG. 7 is a generalized interaction diagram illustrating the interaction between various system components in an exemplary wireless environment suitable for implementation of systems or methods for consumer-controlled storage, management and/or distribution of information.
- An exemplary wireless environment is suited for wireless devices such as digital or cellular telephones, personal digital assistants (“PDAs”), portable computers, and the like.
- PDAs personal digital assistants
- Such wireless devices generally include a display device and an input device (keypad, touch screen, microphone, etc.), each of limited size and utility.
- the difficulty of inputting detailed information and commands into a wireless device makes it desirable to provide a system whereby the backend DBMS 109 is able to communicate directly with various remote web servers, thus eliminating a significant amount of user-interaction with the wireless device.
- the user authentication information is combined with vendor authentication and is sent to the DBMS 109 .
- Vendor authentication information may comprise a vendor ID, password, product IP, application ID, and the like. Vendor authentication information may be used to authenticate the vendor and to determine the manner in which consumer information is to be filtered from the information account 110 .
- the DBMS 109 receives the authentication information, it submits an authentication request to the data repository 102 at step 710 .
- the DBMS 109 performs one or more database queries to retrieve consumer information elements from the information account 110 .
- the DBMS 109 may retrieve certain products (identified by product ID) from the information account 110 , or may retrieve a set of data elements filtered according to a vendor ID or an application ID. If consumer information is retrieved according to products, an iterative lightweight transfer (“LWT”) process may be performed at step 712 in order to get the best set of data elements for each new product ID. Otherwise, the consumer information elements are retrieved from the data repository 102 using appropriate filters at step 714 .
- LWT iterative lightweight transfer
- the consumer information elements may be merged (if appropriate), decrypted (if appropriate) and/or further filtered (if appropriate) at step 716 .
- the resulting information elements are transmitted to the vendor server 114 , for example, in the form of an XML data stream.
- the vendor server 114 receives and processes the consumer information elements at step 720 .
- the vendor server 114 transmits a delivery receipt acknowledgment to the host server 108 at step 722 .
- the host server 108 may then pass an acknowledgment (success or failure) to the consumer (e.g., to the wireless client device 104 a or to another client device 104 ) at step 724 .
- the exemplary generalized interaction diagram then ends at step 726 .
- information accounts 110 may be used in the context of one or more exchanges 802 A&B.
- an exchange 802 A&B may comprises a group of entities (e.g., vendor servers 114 ) that are authorized and configured to accept consumer information from a particular information account 110 at the request of the consumer.
- An information account 110 may, in some embodiments, be used to retrieve information for use in commerce with any vendor that is a member of the exchange 802 A&B.
- An information account 110 may be accepted in one or more exchanges 802 A&B according to various rules and relationships, as illustrated by the examples set forth herein.
- a consumer may also have several different information accounts 110 , each valid for use in one or more exchanges.
- An exchange may comprise a logical grouping of servers or other network devices, and those skilled in the art will appreciate that there are a variety of suitable methods for implementing logical groupings of network devices on a distributed network.
- an exchange identifier may be used to identify an exchange and may be associated with each network device that is a member of that exchange.
- a look-up table of exchange identifiers may be maintained at the host server 108 , within the central data repository 102 or at another suitable location and may be used to authenticate an exchange identifier used in connection with a request for access to an information account 110 .
- Exchanges 802 A&B may be implemented, for example, through inflow and/or outflow constraints.
- An inflow constraint may, for example, dictate that only information accounts 110 associated with specific other exchanges will be accepted within an exchange or that no information accounts 110 associated with other exchanges will be accepted.
- An outflow constraint may dictate that information accounts 110 associated with an exchange may be used within that exchange and within no other exchanges (i.e., a private exchange), or within only selected other exchanges.
- Various business situations and partnerships may drive the implementation of inflow and outflow constraints.
- An exchange 802 A&B may be configured to accept one or more differently branded information accounts 110 .
- This concept is similar to automated teller machine (ATM) networks, in which a customer of one bank may use his ATM card (e.g., debit or credit card) to conduct transactions at the ATM of another bank.
- ATM automated teller machine
- an ATM card includes a number of logos (also referred to as “bugs”) that indicate the financial networks that will accept the ATM card.
- ATMs also display logos identifying the financial networks to which they are connected.
- a bank customer may have a Wachovia® ATM card that is accepted in all Honor and PLUS network ATMs.
- the various vendor servers 114 that make up a particular exchange may include logos or other indicia indicating the brands of information accounts 110 that will be accepted.
- the displayed web page file 116 Y may thus display one or more brand logos 904 indicating the accepted brands of information accounts.
- the displayed web page file 116 Y may also display one or more exchange logos 906 indicating the exchanges of which the vendor server 114 Y is a member.
- the displayed web page file 116 Y may display an access/create link 908 for allowing a consumer to access or create a BrandY information account 110 Y.
- the displayed web page file 116 Y of FIG. 9 is shown by way of example only and many other arrangements are possible.
- the brand logos 904 , the exchange logos 906 and the access/create link 908 might be presented to the consumer only if the consumer selects the enrollment application link 902 .
- Other types of user interfaces may also be used.
- an information account may take the form of a “private” branded information account 110 .
- a BrandX information account 110 X may be established for consumers who participate in the private exchange.
- the BrandX information account 110 X may be configured to store information that is relevant to the financial services offered by Vendor X. If appropriate outflow constraints are established, the BrandX information account 110 X may be accepted only within private Exchange A 802 A.
- Vendor X may facilitate or otherwise sponsor the creation of the BrandX information account 110 X, while another entity may server as the custodian of the data repository 102 for storing the BrandX information account 110 X and provide the underlying information technology.
- a revenue sharing model may specify that a lifetime revenue stream be paid to the originating vendor or entity that is credited with facilitating the creation of an information account 110 .
- a lifetime revenue stream may be effective for the life of the information account 110 and may take the form of a credit issued to the originating vendor or entity each time that information account 110 is used to complete a transaction.
- a credit may amount to a percentage (anywhere from 0% to 100%) of the revenue earned by the custodian of the data repository 102 in connection with the transaction, or an otherwise arranged fee. Revenue sharing models may also specify that credits be paid by the custodian of the data repository 102 to a transacting vendor or entity that accepts consumer information elements from an information account 110 in order to complete a transaction.
- the amounts credited to originating entities and transacting entities may vary depending on the particular exchange and/or which brand of branded information account was used in order to complete a transaction.
- the custodian of the central data repository 102 may grant larger credits to a transacting vendor (Vendor X) when a BrandY information account 110 Y (that is, an information account from another exchange) is used to complete a transaction through the vendor server 114 X, as opposed to when a BrandX information account 110 X (that is, an information account from the same exchange) is used to complete a transaction through the vendor server.
- FIG. 10 is an abstract illustration of system components for implementing revenue sharing models in accordance with certain exemplary embodiments as disclosed herein.
- the central data repository 102 may store one or more transaction logs 1002 containing information relevant to any transaction that involved an information account 110 .
- the transaction log 1002 may identify, for example, the date, time and nature of the transaction, the originating entity, the transacting entity, whether the information account 110 was branded, etc.
- Many alternatives for storing and identifying transaction information are possible in the context of the illustrated embodiment.
- each information account 110 may include or have associated therewith a unique transaction log 1002 .
- a transaction log 1002 may be used to store transaction information associated with multiple information accounts 110 .
- An extraction module 1004 may be used to facilitate the extraction of transaction information from a transaction log 1002 .
- the extraction module 1004 may be executed by the host server 108 or by another network device that is in communication with the host server 108 or the central data repository 102 .
- the extraction module 1004 may be employed to extract selected transaction information from the transaction log 1002 and to translate or transform the extracted transaction information into a format that can be interpreted by a financial processing system 1006 .
- the extraction module 1004 may be configured to extract transaction data elements from a tagged data stream representing or associated with an information account 110 . SOAP and/or other well-known protocols may be used by the extraction module 1004 to interface between the transaction log 1002 and the financial processing system 1006 .
- the financial processing system 1006 may comprise any system for processing transaction information and revenue sharing models in order to ensure that the appropriate party is billed in connection with a transaction involving an information account and that revenues are shared with the appropriate parties.
- the financial processing system may be a custom software module or an off-the-shelf software package, such as the well-known “Oracle Financials” package.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- General Business, Economics & Management (AREA)
- Databases & Information Systems (AREA)
- Economics (AREA)
- Marketing (AREA)
- Entrepreneurship & Innovation (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Game Theory and Decision Science (AREA)
- Human Resources & Organizations (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
In one example, a method for managing information in an environment that includes a client device includes accessing, at the client device, an electronic input interface. Next, the client device transmits a signal to a host system associated with the electronic input interface by entering consumer profile information into the electronic input interface. A request is then made for creation of an information account for storage of the consumer profile information. The client device then receives authentication information from the host system. Finally, the client device enables the vendor to access some of the consumer profile information stored in the information account.
Description
-
RELATED APPLICATIONS
-
The present application is a continuation of U.S. patent application Ser. No. 09/988,811, filed Nov. 20, 2001, which is a continuation-in-part of U.S. patent application Ser. No. 09/974,766 (U.S. Pat. No. 7,016,875), filed Oct. 9, 2001, which is a continuation-in-part of U.S. patent application Ser. No. 09/933,567, (U.S. Pat. No. 7,467,141), filed Aug. 20, 2001, which is a continuation-in-part of U.S. patent application Ser. No. 09/923,285, (U.S. Pat. No. 7,257,581), filed Aug. 6, 2001 (which claims the benefit of U.S. Provisional Patent Application Ser. Nos. 60/223,232 filed Aug. 4, 2000, 60/226,117 filed Aug. 18, 2000, 60/238,847 filed Oct. 6, 2000, 60/245,867 filed Nov. 7, 2000, and 60/253,298 filed Nov. 27, 2000). All of the aforementioned applications are incorporated herein in their entirety by this reference.
BACKGROUND OF THE INVENTION
-
As information technology and network technology become more prolific, people find themselves repeatedly and manually inputting the same data into different computer systems. For example, consumers may find themselves having to manually input their personal and billing information via each vendor website through which they choose to complete an electronic commerce (“e-commerce”) or mobile commerce (“m-commerce”) transaction. As the number of secure websites grows, consumers also find themselves having to manage numerous usernames and passwords. Thus, there is a need for a convenient and secure system for automating the management of consumer information.
-
Automated or partially automated solutions for managing information historically have largely been localized processes. Using conventional techniques, users are able to create and store data files containing personal information on their personal computers or other client devices, such as personal digital assistants (“PDAs”), pagers, mobile telephones, etc. The data elements in such data files can be shared using specialized applications for filtering data out of the data file and into another application. However, such systems typically require a permanent download of proprietary data management software that might not be compatible among different devices. In addition, the data management software and data files are often stored on only a single personal computer or computerized device. If the personal computer or other computerized device becomes lost or stolen, the user's data may no longer be accessible, and might end up in the possession of another person. If the personal computer or other computerized device crashes, the data can easily be lost.
-
From the perspective of providers, such as vendors of on-line products or services, it can be valuable to have access to consumer information in order to, for example, facilitate e-commerce or m-commerce transactions, or else to better understand consumers or communicate with them about products or services in which they might be interested. However, consumers are often reluctant to provide their personal information, often in part due to concerns over security of the information. Also, consumers may not want to take the time to re-enter their personal information at different on-line provider sites. Providers of on-line products or services may therefore benefit from a mechanism which entices consumers to provide their personal information by minimizing the burden on consumers when conducting on-line transactions requiring personal information and by allowing consumers to retain control over the type and amount of information that is released to the provider.
-
Accordingly, there remains a need for a more secure, flexible and convenient system for storing information and a method for allowing the user to manage and distribute that information using a personal computer or other network-connected device. There further remains a need for such a system and method that provides central information storage and does not require a permanent download of proprietary software to a client device for management and distribution of the information. Additionally, there is a need for a mechanism which encourages consumers to provide their personal information to provider of on-line products or services.
BRIEF DESCRIPTION OF THE DRAWINGS
- FIG. 1
is a high-level block diagram illustrating a system in accordance with one or more exemplary embodiments as disclosed herein.
- FIG. 2
is an abstract illustration of an information account in accordance with exemplary embodiments as may be used, for example, in the system illustrated in
FIG. 1.
- FIG. 3
is an abstract illustration of another information account in accordance with other exemplary embodiments as may be used, for example, in the system illustrated in
FIG. 1.
- FIG. 4
is an abstract illustration of an exemplary database schema in accordance with certain exemplary embodiments.
- FIG. 5
is a generalized interaction diagram illustrating the interaction between various system components of certain exemplary embodiments as disclosed herein.
- FIG. 6
is a generalized interaction diagram illustrating the interaction between various system components when a new information account is created by a consumer via a vendor's website, in accordance with one or more exemplary embodiments.
- FIG. 7
is a generalized interaction diagram illustrating the interaction between various system components in an exemplary wireless environment.
- FIG. 8
is a high-level block diagram illustrating logical grouping of vendor servers into exchanges in accordance with one or more exemplary embodiments as disclosed herein.
- FIG. 9
is an illustration of a web page displaying logos that identify a branded information account and exchange membership in accordance with one or more exemplary embodiments as disclosed herein.
- FIG. 10
is an abstract illustration of exemplary system components for implementing revenue sharing models in accordance with certain exemplary embodiments.
DETAILED DESCRIPTION OF SOME EXAMPLE EMBODIMENTS
-
In one or more embodiments, a system and method are provided for enabling consumers to store and maintain a comprehensive information profile (hereinafter “information account”) in a centralized data repository that is accessible over a distributed electronic network, such as the Internet. The information account may be used to store any type of data desired by the consumer, including, for example, demographic information, financial information, medical information, family information, contact information, documents, image files, multimedia files, etc. The centralized data repository is preferably accessible via a network by any authorized network device. In various embodiments, no specialized application programs are required to be permanently downloaded to the consumer's network device in order to access the information account.
-
According to certain embodiments, at the consumer's direction, selected information in the information account may be accessed and, if desired, shared with authorized vendors, business partners or any other entity that requires certain of the consumer's information. The terms “vendor” and “business partner” are used herein in a general sense to refer to persons, businesses, enterprises or entities that make products or services available to consumers. As used herein, the terms “consumer,” “buyer,” and “user” are interchangeable.
-
Server-side software or temporary client-side software may, in some embodiments, be used to manage communications with the information account and to automatically integrate that consumer information into a process executed by a network device. As an example, the network device may execute a business process relating to a consumer-initiated activity, such as a retail transaction. The server-side software or temporary client-side software may receive consumer information from the information account and use that information to automatically populate the input fields of a form or the input requirements of a process that is to be submitted to a vendor's server or other network device during an application, registration or transaction process.
-
The data in the information account is preferably stored using a tagged data format. In one embodiment, the data in the information account may be stored using the eXtensible Markup Language (“XML”) data format, which is an open standard for describing data from the World Wide Web Consortium (“W3C”). As is known in the art, XML tags are used to define the types of information that are represented by the data element. The XML standard provides a great deal of flexibility in that custom tags may be defined for any type of information that the consumer may desire to store in the information account. Using any well-known XML-related querying, parsing, transforming and/or filtering techniques, individual data elements in the information account may be accessed, updated, deleted, created, or otherwise manipulated.
-
The information account may be structured as one or more data aggregates, e.g., XML data aggregates. An entire XML data aggregate is stored within a data field of a database table. This data field is a long text field containing all of the information associated with the given record. In one embodiment, all consumer information in the information account may be stored in a single XML data aggregate comprising consumer information elements and sub-elements. Attributes may also be associated with any element and sub-element in order to provide additional information. A transformation or filtering mechanism, such as “Style Sheets,” may be applied to the single XML data stream in order to extract only selected data elements therefrom at the direction of the consumer.
-
In an alternative embodiment, the information account may be normalized into a plurality of discrete data aggregates, each aggregate representing a predetermined “information product.” An information product refers to a package of consumer information relating to a specific product or service offered by a vendor. For example, a mortgage information product might contain all consumer information that would be required to complete a lender's mortgage application. Individual information products may be retrieved from the information account and transmitted to authorized vendors at the request of the consumer.
-
Access constraints may be utilized in one or more embodiments as described herein to allow for the establishment of “exchanges.” An exchange generally refers to a group of entities that are authorized to accept consumer information from the information account at the request of the consumer. The information account may be accessed for retrieval of information to be used in commerce with any vendor or entity that is a member of the exchange. In much the same way that a consumer may have several different credit cards or debit cards that are each accepted only by certain merchants, the consumer may have several information accounts that are each valid only on specified exchanges.
-
Exchanges may be implemented, for example, through “inflow” and/or “outflow” constraints imposed by the exchanges. An inflow constraint imposed by an exchange may, for example, dictate that only information accounts associated with specific other exchanges will be accepted or that no information accounts associated with other exchanges will be accepted. An outflow constraint may dictate that information accounts associated with an exchange may only be used within that exchange and within no other exchanges. Various business situations and partnerships may drive the implementation of inflow and outflow constraints. Revenue sharing models may be established in order to provide financial incentives to exchanges and/or individual vendors that facilitate the creation of an information account or the use of an information account to complete a transaction.
-
Exemplary embodiments will now be described with reference to the drawings, in which like numerals represent like elements throughout the several figures. A high-level block diagram of a system in accordance with an exemplary embodiment is shown in and described with reference to
FIG. 1. As shown, a
central data repository102 is provided for storing consumer information that may be easily accessed from any network device attached to the
network106. The
network106 may comprise any telecommunication and/or data network, whether public or private, such as a local area network, a wide area network, an intranet, an internet and any combination thereof and may be wireline and/or wireless. Various methodologies as described herein may be practiced in the context of distributed computing environments. The
network106 thus provides for the open and seamless distribution of consumer information to and from the
information account110.
-
In the system illustrated in
FIG. 1, the exemplary operating environment encompasses various network devices for accessing and reading associated computer-readable media having stored thereon data and/or computer-executable instructions for implementing various methods of the present invention of data storage, management and distribution. Generally, a network device includes a communication device for transmitting and receiving data and/or computer-executable instructions over the
network106, and a memory for storing data and/or computer-executable instructions. A network device may also include a processor for processing data and executing computer-executable instructions, as well as other internal and peripheral components that are well known in the art (e.g., input and output devices.) As used herein, the term “computer-readable medium” describes any form of computer memory or a propagated signal transmission medium. Propagated signals representing data and computer-executable instructions are transferred between network devices.
-
A network device may generally comprise any device that is capable of communicating with the resources of the
network106. A network device may comprise, for example, a
network server108 & 114, a
client device104, a
wireless client device104 a or a dedicated storage device (e.g., the
central data repository102.) In the embodiment shown in
FIG. 1, a
host server108 hosts the software for interacting with the
central data repository102 and for communicating with other network devices. The
host server108 may interact with the
central data repository102 via the
network106 or via a
direct communication link111. A
vendor server114 hosts vendor web page files 116 comprising a vendor website, through which products or services may be offered to consumers.
-
A
client device104 may comprise a desktop computer, a laptop computer and the like. A
wireless client device104 a may comprise a personal digital assistant (PDA), a digital and/or cellular telephone or pager, a handheld computer, or any other mobile device. These and other types of
client devices104 & 104 a will be apparent to one of ordinary skill in the art. For convenience, the following explanation will be made with reference to a
client device104 generically, but, unless otherwise indicated, it will be understood that the principles and concepts described will also encompass wired or wireless devices, such as
wireless client device104 a illustrated in
FIG. 1. Moreover, although exemplary embodiments will be described herein in the context of the Internet or a web-based environment, it will be appreciated that the various principles and methods of operation will be applicable or may be practiced in other environments as well.
-
According to a preferred embodiment, a
client device104 may execute a
browser112 or another suitable application for interacting with web page files 116 hosted by a
vendor server114 and other network devices. Through the graphical user interface provided by a displayed web page file 116, the vendor may require the consumer (i.e., the operator of the client device 104) to input certain information pertaining to or associated with the consumer. According to certain embodiments, a consumer may be permitted to direct that the requested information be transmitted from the
information account110 to the
client device104 for processing. Although exemplary embodiments will be described herein in the context of a web-based environment, those skilled in the art will appreciate that other environments are suitable as well.
-
The description of exemplary embodiments with reference to
FIG. 1assumes the existence of a previously created
information account110. An example illustrating actual creation of an
information account110 will be described below with reference to
FIG. 6. In general, the
information account110 may be any data structure for storing consumer information. Preferably, however, the
information account110 is stored as a tagged data structure, such as one or more XML data aggregates. The data in the
information account110 is preferably encrypted so that anyone gaining unauthorized access to the
information account110 will not be able to read the data. Also, in a preferred embodiment, each
information account110 in the
central data repository102 is encrypted separately, so that someone authorized to access the information account of one consumer may not also gain access to the information account of another consumer.
-
In accordance with a preferred embodiment, the consumers may maintain sole responsibility for storing and updating the information in the
information account110. Only the consumer, or those authorized by the consumer, may use the
information account110 to complete e-commerce or m-commerce activities. Consumers create an
information account110 either through a website hosted by the
host server108 or a website hosted by a
vendor server114. For example, after manually completing a form displayed by a vendor's website, the consumer can choose to create an
information account110 and have the consumer information stored therein.
-
Upon creation of an
information account110, a consumer may be given an identification number, a username and/or a password. Other types of consumer authentication information are known in the art and may also be used in the context of the present invention. The system of
FIG. 1provides the consumer with a variety of methods of accessing the
information account110, transferring selected information to a vendor and/or allowing a vendor limited and constrained access to the
information account110, as described in further detail herein.
-
In one embodiment as described herein, a single sign-on mechanism may be provided to allow a consumer to “sign-on” (provide username and password, etc.) for authentication to access an
information account110 at only a first website. The authentication status may then “follow” the consumer as the consumer accesses subsequent websites. At such subsequent websites, a consumer who has activated the single sign-on mechanism will not be asked to re-authenticate himself. For example, the
host server108 may maintain an authentication table (not shown) that records the consumer authenticatic information, the sign-on time and a browser identifier. When the consumer accesses a subsequent website that requires sign-on for accessing the
information account110, the client-
side application105 may communicate the browser identifier to the
host server108. The
host server108 may use the browser identifier to look up the consumer authentication information and previous sign-on time in the authentication table. The previous sign-on time may be compared to the current time in order to determine whether a time-out interval has expired. If the time-out interval has not expired, the
host server108 may acknowledge that the consumer is authenticated.
-
A web page file 116 displayed by the
browser112 may include input fields for the input of consumer information. The web page file 116 may also include an instruction (e.g., a “call”) that causes the
browser112 to download and execute a client-
side application105. JAVA applets are well known client-side applications and are particularly suited for use in various embodiments due to their platform-independent nature. However, any other type of client-side application may be used without departing from the spirit and scope of the present invention. The client-
side application105 resides in temporary memory storage of the
client device104, such as cache memory or the like, and may be removed from the
client device104 after its execution is complete. The client-
side application105 is specific to the browser session only and not to the
client device104. Multiple client-
side applications105 may be executed at the same time if multiple browser windows are executed by the
client device104. The client-
side application105 provides functionality for facilitating communications between the
browser112 executed by the
client device104 and the database management system (“DBMS”) 109 of the
host server108.
-
One responsibility of the client-
side application105 is to provide authentication information associated with the consumer and the vendor to the
host server108. Depending on the desired level of security within the system, authentication information may comprise a username, user ID, password, key, certificate and the like. Authentication information regarding the vendor may be embedded within the web page file 116 for extraction by the client-
side application105. Alternatively, the client-
side application105 may communicate with the
vendor server114 to retrieve such vendor authentication information. Authentication information regarding the consumer may be supplied by the consumer via a user interface displayed by the client-
side application105. Communications relating to authentication information may be accomplished using a secure transmission protocol or handshake, such as the secure shell BSD, Point to Point Tunneling Protocol (PPTP), also commonly know as Virtual Private Network, and/or secure socket layering (SSL) protocol. Other methods for achieving a secure connection over the
network106 will be apparent to those of ordinary skill in the art. Authentication information may also be encrypted and transmitted over an open network using any appropriate protocol.
-
The client-
side application105 is also responsible for determining the type of consumer information that is required by the input fields of the displayed web page file 116. After determining the type of consumer information that is required, the client-
side application105 may formulate a database query in a language that is understood by the
DBMS109. At a minimum, client-
side application105 communicates enough information to the
DBMS109 regarding the required consumer information so that the DBMS can formulate a database query. In one embodiment, the
DBMS109 exposes an application program interface (“API”) that can be utilized by the client-
side application105. An example of one such API is known as the Simple Object Access Protocol (“SOAP”). SOAP is a protocol that provides for interoperability between heterogeneous HTTP-based software and XML-based software. SOAP provides access to services, objects, and servers in a platform-independent manner. Since SOAP relies on HTTP as the transport mechanism, and most firewalls allow HTTP to pass through, SOAP endpoints may usually be invoked from either side of a firewall.
-
The client-
side application105 may transmit the database query (or information to form the database query) to the
host server108 along with the above-mentioned authentication information over a secure connection. In such a scenario, the authentication information and the query information may be passed to the
DBMS109. The
DBMS109 attempts to authenticate the vendor and the consumer using the authentication information and corresponding information that was previously stored in the
data repository102. If authentication is successful, the
DBMS109 queries the
information account110 using the appropriate database connectivity protocol, such as the Open Database Connectivity (“ODBC”) protocol, the Java Database Connectivity Protocol (“JDBC”), or any other suitable protocol.
-
As mentioned above, the data in the
information account110 may be encrypted. Thus, in response to the query, the
DBMS109 may receive an encrypted search result. The search result, for example, may be in the form of a stream of XML data that has been filtered from the information account. The
DBMS109 or other program module executed by the
host server108 may be responsible for decrypting the search result. The decrypted search results may then be transmitted to the client-
side application105 via the previously established or a new secure connection.
-
In the alternative, the client-
side application105 may manage authentication and querying as separate processes. As an example, authentication may be handled using a secure connection as described above. Upon acknowledgment of authentication, the secure connection may be closed and the query process may be handled using open network communication protocols. In response to the query, the encrypted search result may be transmitted to the client-
side application105 over the open network and the client-
side application105 may be responsible for decryption.
-
The client-
side application105 may also be responsible for parsing the data elements included in the search result and auto-populating the parsed data into the input fields of the displayed web page file 116. Again, the client-
side application105 may translate the XML data into HTTP data using SOAP or another suitable protocol. Those skilled in the art will appreciate that in certain embodiments, especially where user verification of the consumer information is not required, the client-
side application105 may transmit the consumer information directly to the
vendor server114 without populating the consumer information into the displayed web page file 116. If the input fields are auto-populated, the consumer has the opportunity to verify the information displayed in the input fields, make any necessary modifications, and then interact with the displayed web page file 116 to submit the information to the
vendor server114. Any modifications to the consumer information that are made by the consumer may be detected by the client-
side application105, which may then transmit the modified data back to the
host server108 for an appropriate update of the
information account110. In addition, the client-
side application105 may determine whether the consumer inputs new data into the input fields, and if so, transmit that new information to the
host server108 for storage in the
data repository102. The consumer may interact with the displayed web page file 116 to submit the consumer information to the
vendor server114. The
vendor server114 may then process the consumer information, as needed, by way of a processing module.
-
In an alternative embodiment, a server-
side application107 may be employed instead of a client-
side application105 to manage communications with the
host server108. An authorized server-
side application107 may receive consumer information directly from the
host server108 and present that consumer information to the client device 104 (e.g., via the browser 112) for display to the consumer. A web page file 116 hosted by the
vendor server114 may be accessed and displayed by the
browser112 of the
client device104. The displayed web page file 116 may present a user interface for input of consumer authentication information. In a preferred embodiment, the consumer authentication information is transmitted from the
client device104 to the
host server108 for authentication of the consumer. In addition, the
client device104 may also transmit a request that a “ticket” be provided to the
vendor server114.
-
As used herein, the term “ticket” refers to a temporary authorization for at least partial access to a consumer's
information account110. Although not shown in the figure, an
information account110 may be associated with a data table or other data structure that correlates one or more tickets with a set of consumer-defined attributes. The consumer-defined attributes may determine such things as the number of times that the password may be used to access the information account 110 (e.g., one-time use), any period of validity associated with the ticket (e.g., ticket expires one week from issuance), whether the ticket carries read, write and/or modify privileges, etc. The ticket attributes may also include any number of identifiers, such as a vendor identifier, a data identifier, and filter identifiers, which may be used to ensure that the party using the ticket is in fact authorized to do so, and to ensure that only authorized data is filtered for release to that party.
-
Upon authenticating the consumer, for example by using standard browser authentication techniques, the
host server108 may redirect the
browser112 of the
client device104 to another web page data file 116 (e.g., another web page data file 116 hosted by of the vendor server 114), including the ticket as a parameter in the URL. In response to detecting the ticket, the vendor server may extract the ticket and pass it to the server-
side application107. The server-
side application107 may then use the ticket to authenticate itself to the
host server108, for example using SOAP or another suitable protocol.
-
In accordance with one embodiment as described herein, a ticket generated by the
host server108 may be a “Globally Unique Identifier” (“GUID”). A GUID preferably comprises a unique number that is computed by adding the time and date to a network adapter's internal serial number, or by any other suitable technique. The ticket may be encrypted. For example, the ticket may be encrypted using the vendor's public key and the resulting binary encrypted blob may be base64 encoded such that so that it can be included as a parameter in a URL. At the
vendor server114, the parameter may be extracted from the URL, base64 decoded and then decrypted using the vendor's private key. Other encryption techniques may also be used.
-
In an alternative embodiment, consumer authentication information may be submitted from the
client device104 to the server-
side application107 at the
vendor server114. The server-
side application107 may then transmit the consumer authentication information and vendor authentication information to the
host server108 for authentication of both the consumer and the vendor. The consumer authentication information may be encrypted at the
client device104 and decrypted only at the
host server108. Such an embodiment, however, places a significant amount of control over the consumer's data in the hands of the vendor, and thus may not be preferable.
-
The server-side application may be identified by an application identifier (“APPID”). The APPID may be associated at the host server 108 (e.g., by the DBMS 109) with a particular filtering mechanism. As mentioned, style sheets are well-known and highly suitable filtering tools for use in conjunction with XML data. In response to authenticating the server-
side application107 and identifying the appropriate filter, consumer information may be filtered from the
information account110 and transmitted back to the server-
side application107. The server-
side application107 may then parse the consumer information, for example, in order to auto-populate a form, which may or may not have been previously displayed to the consumer.
-
As in the case of the client-
side application105, the server-
side application107 may receive decrypted consumer information from the
host server108 via a secure connection, or may receive encrypted consumer information via the open network. Thus, the server-
side application107 may be configured to perform decryption as necessary. The consumer information thus received from the
host server108 may be presented to the consumer for verification. Any modifications or additions made to the consumer information may be submitted back to the server-
side application107 for communication to the
host server108. The
DBMS109 may then update and/or create the
information account110 in the appropriate manner. The consumer may interact with the displayed web page file 116 to submit the consumer information to the
vendor server114. The
vendor server114 may then process the consumer information, as needed, by way of a processing module.
-
Those skilled in the art will appreciate that the illustration and discussion of exemplary embodiments with reference to
FIG. 1is provided as a generalized example only. Specific details regarding data formats and network communication protocols have been omitted, as such details are well known in the art. Furthermore, the present invention is not intended to be limited to the use of any particular data formats or protocols. Any existing or future formats or protocols may be used without departing from the spirit and scope of the invention. Furthermore, many network components were not shown or discussed with reference to
FIG. 1, such as gateways, routers, hubs, switches, firewalls, DNS servers, authentication servers, certificate authorities, and the like. The functions and roles of such network components are also well known in the art and need not be described in detail herein.
- FIG. 2
provides an abstract illustration of an
information account110 in accordance with an exemplary embodiment as described herein. In the illustrated embodiment, the consumer information is stored in the
information account110 as a single tagged (delimited) data stream. XML generally provides a suitable tagged data format; however, other tagged data formats can be employed as well. Thus, references to the XML standard in connection with exemplary embodiments are not intended to limit the scope of the present invention. The single XML data stream comprises a plurality of
consumer information elements202, each having a
unique tag204 or identifier. A
consumer information element202 may be divided into any number and/or level of
sub-elements206. As is well known in the art, an XML
consumer information element202 may also be associated with one or more attributes 208. An
attribute208 may provide additional information about the content, structure or formatting of a
consumer information element202.
-
A
consumer information element202 may comprise any type of data or information, including text strings, objects, files, applications, etc. Obviously, the more consumer information that is stored in the
information account110, the larger the XML data stream will be. The size of the XML data stream is limited only by the hardware and software limitations of the system (e.g., memory size, processor speed, bandwidth, etc).
-
An
information account110 is preferably unique to a single customer. Each information account 110 stored in the
data repository102 may thus comprise a discrete XML data stream. Each information account 110 stored in the
data repository102 may be individually encrypted. For example, one method for encrypting an
information account110 may involve use of the consumer's public key. Accordingly, only someone having access to the consumer's private key will be able to decrypt the consumer's information. Many other and/or additional methods for encrypting information accounts 110 and/or the
entire data repository102 will occur to those skilled in the art.
-
Although not shown in
FIG. 2, those skilled in the art will appreciate that a
consumer information element202 in one
information account110 may comprise a pointer or a reference to another data element or to another
information account110. In one embodiment, a consumer may create, for example, a list of business contacts. A new information account may be created for each individual specified as a business contact by the consumer. Authentication data within the new information account may be set as “anonymous” so that the first consumer may retain access privileges. At some point later, however, the individual named as the business contact may be given control of the new information account by changing the associated authentication information to be unique to that individual. The first consumer may then be granted limited access privileges to continue to access the new information account of the business contact (e.g., by way of a ticket). Alternatively, the first consumer may retain a copy of the business contact information in his own information account.
- FIG. 3
provides an abstract illustration of an
information account110 in accordance with other exemplary embodiments of the present invention. In the embodiment shown, an
information account110 is structured as multiple discrete XML aggregates 302 a-c. The discrete XML aggregates 302 a-c may comprise one primary “profile”
record302 a and one or more
information product records302 b-e. The
profile record302 a may include a general profile of
information elements304 associated with the consumer.
Information product records302 b-c contain consumer information elements that, for example, are specific to a particular product or service offered by a vendor, or that are important to vendors with similar consumer information needs. Aggregation of data elements according to information products allows quick and efficient retrieval of specific consumer information from the
information account110 through a request-response system.
-
The number of aggregates or records included within the
information account110 of a given consumer depends upon the number of information products for which the consumer has elected to store information. For example, a consumer who has elected to store information about two separate products, such as a car loan and a mortgage loan, would have at least three data aggregates in his
information account110. One such data aggregate would represent the primary profile record and each of the two other data aggregates would include information about one of the information products. Data aggregates may include but are not limited to the following information products: Home Loan, Auto Loan, Student Loan, Home Insurance, Auto Insurance, Life Insurance, Online Banking, Credit Card, Government Services, Education, Career, Travel, Retail, and Relocation. If a consumer creates or updates an information account via a vendor's web site and thereby inputs information regarding a new product, a
new product record302 b-c will be created in the information account. Each
product record302 b-c created for the consumer is of course associated with the
primary profile record302 a.
-
If an
information account110 is segmented into multiple discrete data aggregates, there may be a need for maintaining consistency among redundant data elements stored in multiple information products. “Latent referential processing” is one method for maintaining data consistency, and in this context refers to the use of a series of pointers or references to flag data that is redundant across multiple products. According to latent referential processing, when a record 302 a-c is created or updated, redundant information elements that are stored in other data aggregates typically are not also updated until the next time the information account is accessed. For example, if salary information is updated in a home loan information product record, redundant salary information in the consumer's auto loan information product record will generally not be immediately updated. Thus, latent referential processing allows data inconsistencies to exist within the information account after an update.
-
As is shown and described with reference to
FIG. 4, a transaction log (e.g., a time stamp log) may be maintained for each redundantly stored aggregate in the information account to record the date and time of the most recent update for each data record 302 a-c. Each time a request is made to access the information account, the
DBMS109 may first examine the time stamp log to determine which data element in a set of redundant data elements has most recently been updated. After determining the most recently updated data element, all other redundant data elements are updated to be consistent with the most recently updated data element. Upon completion of the latent referential processing, the request to access the information account may be granted. Accordingly, latent referential processing is a new way of storing and tracking information that addresses the need of providing quick access to information that will be accessed more frequently than it will be updated.
-
In another embodiment, redundancy and consistency concerns are addressed by normalizing the data aggregates of the
information account110 to the extent possible. For example, an
information account110 may be configured such that the consumer's
profile record302 a stores the majority of the consumer's personal information. The
profile record302 a may comprise predefined data elements, such as “first name,” “middle name,” “last name,” date of birth,” etc. The
profile aggregate302 a may also be expanded to include any additional and/or custom fields. Additional aggregates corresponding to
information products302 c may contain
pointers306 to the data fields within the
profile aggregate302 a. Thus, the
information account110 may be configured to store within one aggregate a single instance of an information element that is referenced by other aggregates. As information product aggregates 302 c are formed independently of the
profile aggregate302 a, data elements that are not unique to those information product aggregates 302 c may be ported into the
profile aggregate302 a if desired.
- FIG. 4
illustrates an
exemplary database schema400 in accordance with one or more exemplary embodiments as disclosed herein. In particular, the
database schema400 represents the situation where the
information account110 is segmented into multiple discrete data aggregates, as shown in
FIG. 3. The
database schema400 may include a
consumer authentication record402 that stores
consumer authentication information404 such as, for example, a user ID, username, password, email address, access attempts, last attempt date/time, challenge word or phrase, challenge response, ticket parameters, and vendor credited with origination of the information account. These and other types of authentication information may be used to authenticate a consumer. The
database schema400 may also include a
profile record302 a that stores a
primary information profile304 of the consumer. There will typically be a one to one relationship between the consumer authentication table 402 and the
profile record302 a. The
exemplary database schema400 also includes one or more
information product records302 b-c that store product-specific information. Each
profile record302 a may be associated with one or many
information product records302 b-c.
-
The
profile record302 a and each
information product record302 b-c may further be associated with a
transaction log record406. Each time the
profile record302 a or an
information product record302 b-c is acted upon,
detailed transaction information408 may be recorded in a new transaction log record 406 (not to be confused with the above-mentioned time stamp log.)
Transaction information408 may provide the basis for all transaction billing and revenue sharing events. By way of example only, the
transaction record406 may identify the vendor server through which the
information account110 was created. The
transaction record406 may also identify the vendor server through which a transaction was completed using the
information account110.
-
As used herein, the term “transaction” refers broadly to any activity related to an information account, including, but not limited to a create transaction, delete transaction, update transaction, authentication transaction, a request for information from authorized vendors, a client device and/or
vendor server114 request, a publishing and form filling transaction, and a submit transaction where the
information account110 is processed into the requesting vendors systems. A portion of any monies billed upon completion of a transaction may be shared with each of the vendor servers identified in the
transaction record406.
- FIG. 5
. is a generalized interaction diagram illustrating the interaction between various system components of certain exemplary embodiments in connection with consumer-controlled storing, managing and/or distributing information. The exemplary embodiments discussed with reference to
FIG. 5employ a client-
side application105, such as an applet, to manage communication between the
client device104 and the
host server108. Alternative embodiments employing a server-
side application107 instead of the client-
side application105 have been discussed above. Those skilled in the art will appreciate the differences between the interactions involving a client-
side application105 and a server-
side application107.
-
The generalized interaction diagram begins at
step501, where the consumer operates a
browser112 to retrieve a web page file 116 from the
vendor server114 via the
network106, using a consumer browser. The web page file 116 retrieved from the
vendor server114 may be enabled for interaction with the consumer's
information account110 and may thus include an instruction that causes the
browser112 to download a client-side application from the
host server108. At
step502, the client-side application is downloaded from the
host server108 to the
browser112. At
step504, the consumer interacts with the
browser112 to request use of the
information account110, which in this example has already been created. The web page file 116 may display a selectable icon or other indicia that allows the consumer to request use of the
information account110. Alternatively, the client-
side application105 may provide the interface for requesting use of the
information account110.
-
Next at
step506, the client-
side application105 displays a login interface to the consumer. The login interface may be displayed, for example, in the open display window of the
browser112, in a pop-up window, or in any other suitable manner. At
step508 the consumer inputs consumer authentication information, which is transferred from the browser to the client-
side application105. Consumer authentication information may comprise, for example, a username, user ID, password, challenge phrase, email address, etc. At
step510, the user authentication information is combined with vendor authentication information and is sent to the
DBMS109. Vendor authentication information may comprise a vendor ID, password, product IP, application ID, and the like. Vendor authentication information may be used to authenticate the vendor and to determine the manner in which consumer information is to be filtered from the
information account110.
-
After the
DBMS109 receives the authentication information, it submits an authentication request to the
data repository102 at
step512. The authentication request may be a database query to determine if the supplied consumer authentication information and vendor authentication information are consistent with previously stored authentication information. In response to authenticating the consumer and the vendor, the
DBMS109 performs one or more database queries at
step514 to retrieve consumer information elements from the
information account110. Depending on the structure of the information account, the
DBMS109 may retrieve certain products (identified by product ID) from the
information account110, or may retrieve a set of data elements filtered according to a vendor ID or an application ID. If consumer information is retrieved according to products, an iterative lightweight transfer (“LWT”) process may be performed in order to get the best set of data elements for each new product ID. Lightweight transfer techniques are well-known in the art and generally involve the use of thin protocols and/or smart proxies that can cache results and perform buffered reads and writes, minimizing the number of network calls.
-
Once the
DBMS109 has retrieved the relevant consumer information, the consumer information elements may be merged (if appropriate) decrypted (if appropriate) and/or further filtered (if appropriate) at
step518. Then, at
step520, the resulting information elements are transmitted to the client-
side application105, for example in the form of an XML data stream. At
step522, the client-
side application105 parses the received XML data and transforms it into the required format for populating the input fields of the displayed web page file 116. The client-
side application105 then auto-populates the input fields of the displayed web-page file 116 at
step524. The consumer may interact with the
browser112 to edit or modify the auto-populated information at
step526. Because there may be multiple web page files 116 associated with the vendor website, steps 524 and 526 are repeated until all data has been auto-populated and/or edited on every included web page. The client-
side application105 monitors the edit process to determine if the consumer desires to modify and/or supplement any of the consumer information elements.
-
The consumer may then interact with the
browser112 at
step528 in order to submit the consumer information that has been entered into the displayed web page file(s) 116 to the
vendor server114. The
vendor server114 receives and processes the consumer information elements at
step530. After processing the consumer information, the
vendor server114 preferably transmits a “success page” or other acknowledgement to the consumer's
browser112 at
step532.
-
Either through a selectable icon or other indicia displayed on the success page or displayed by the client-
side application105, or any other interactive means, the consumer may interact with the
browser112 at
step534 to submit an update request to the
DBMS109. Update is an event whereby the
information account110 is updated to reflect any edits that the consumer may have made to the consumer information at
step526. Thus, a consumer is permitted to update the
information account110 via a vendor's website. As another option, the consumer may elect to update the
information account110 at a later time directly via the
host server108.
-
At
step536 the client-side application submits the consumer's XML data (possibly only the edited data) and the update request to the
DBMS109. Then at
step538 the update request is submitted to the data repository for authentication. In the authentication process, consumer authentication information, vendor authentication information and, if appropriate, product identification information (which are all included in the update request) are verified. Upon authentication of the update request, the XML data is validated at
step540 and the update is performed at
step542. The DBMS then sends the update result (success or failure) to the client-
side application105 at
step544, which in turn displays the update result to the
browser112 at
step546. The exemplary generalized interaction diagram then ends at
step548.
- FIG. 6
is a generalized interaction diagram illustrating the interaction between main system components when a new information account is created by a consumer via a vendor's website. As mentioned, the consumer may create an information account by visiting a vendor's website that has been configured to allow creation of an information account. The vendor's website may, for example, require the user to manually input consumer information into the input fields of a form. The user may then direct that an information account be created to store the consumer information, so that the consumer will not be required to manually enter the consumer information again on any participating website.
-
The exemplary embodiments discussed with reference to
FIG. 6employ a client-
side application105, such as an applet, to manage communication between the
client device104 and the
host server108. Alternative embodiments employing a server-
side application107 instead of the client-
side application105 have been discussed above. Those skilled in the art will appreciate the differences between the interactions involving a client-
side application105 and a server-
side application107.
-
The exemplary interaction diagram of
FIG. 6begins at
step601, where the consumer operates a
browser112 to retrieve a web page file 116 from the
vendor server114 via the
network106, using a consumer browser. The web page file 116 retrieved from the
vendor server114 may be enabled for interaction with the consumer's
information account110 and may thus include an instruction that causes the
browser112 to download a client-side application from the
host server108. At
step602, the client-side application is downloaded from the
host server108 to the
browser112. At
step604, the consumer interacts with the
browser112 to input consumer information into the input fields of the vendor's website. The client-
side application105 monitors the input of consumer information at
step606.
-
Next at
step608 the consumer interacts with the
browser112 in order to submit the consumer information to the
vendor server114. The
vendor server114 receives and processes the consumer information elements at
step610. After processing the consumer information, the
vendor server114 transmits a “success page” or other acknowledgement to the consumer's
browser112 at
step612. Either through a selectable icon or other indicia displayed on the success page or displayed by the client-
side application105, the consumer may interact with the
browser112 at
step614 to submit a request for creation of an
information account110 to the
DBMS109. Thus, the consumer may be permitted to create an
information account110 via a vendor's website. As another option, the consumer may elect to create an
information account110 at a later time directly via the
host server108.
-
At
step616 the client-side application submits the consumer's XML data and the create request to the
host server108. Then at
step618 the
host server108 transmits an information account creation interface to the
browser112. The consumer inputs consumer authentication information via the information account creation interface at
step622 and the
browser112 passes the create request (which may include the consumer authentication information, the vendor authentication information, etc.) to the client-
side application105 at
step624.
-
At
step626, the create request is combined with the consumer's XML data and is sent to the
DBMS109. In response to receiving the authentication information, the
DBMS109 submits an authentication request to the
data repository102 at
step628. The authentication request may be a database query to determine if the supplied consumer authentication information and vendor authentication information are consistent with previously stored authentication information. In response to authenticating the consumer and the vendor, the
DBMS109 validates the consumer's XML data at
step630 and creates a
new information account110 at
step632.
-
Once the information account has been created, the
DBMS109 sends the create result (success or failure) to the client-
side application105 at
step634, which in turn displays the create result to the
browser112 at
step636. At
step638, the
host server108 creates an acknowledgment email to be sent to the consumer's email account. At
step640, the host server requests and receives the consumer's email address from the
DBMS109. At
step642 the consumer's acknowledgment email is delivered to the consumer. The exemplary generalized interaction diagram then ends at
step644.
- FIG. 7
is a generalized interaction diagram illustrating the interaction between various system components in an exemplary wireless environment suitable for implementation of systems or methods for consumer-controlled storage, management and/or distribution of information. An exemplary wireless environment is suited for wireless devices such as digital or cellular telephones, personal digital assistants (“PDAs”), portable computers, and the like. Such wireless devices generally include a display device and an input device (keypad, touch screen, microphone, etc.), each of limited size and utility. The difficulty of inputting detailed information and commands into a wireless device makes it desirable to provide a system whereby the
backend DBMS109 is able to communicate directly with various remote web servers, thus eliminating a significant amount of user-interaction with the wireless device.
-
The generalized interaction diagram of
FIG. 7begins at
step701, where the consumer operates a
wireless client device104 a to access the
host server108. Accessing the
host server108 may involve, for example, calling a dedicated access number using a mobile telephone device or two-way pager. At
step702, the
wireless client device104 a accesses the
host server108 via a wireless application (“WAP”) gateway. At
step704, the
host server108 returns a login interface to the
wireless client device104 a. At
step706 the consumer inputs consumer authentication information using an input device of the
wireless client device104 a. Consumer authentication information may comprise, for example, a username, user ID, password, challenge phrase, email address, etc.
-
At
step708, the user authentication information is combined with vendor authentication and is sent to the
DBMS109. Vendor authentication information may comprise a vendor ID, password, product IP, application ID, and the like. Vendor authentication information may be used to authenticate the vendor and to determine the manner in which consumer information is to be filtered from the
information account110. After the
DBMS109 receives the authentication information, it submits an authentication request to the
data repository102 at
step710. In response to authenticating the consumer and the vendor, the
DBMS109 performs one or more database queries to retrieve consumer information elements from the
information account110. Depending on the structure of the information account, the
DBMS109 may retrieve certain products (identified by product ID) from the
information account110, or may retrieve a set of data elements filtered according to a vendor ID or an application ID. If consumer information is retrieved according to products, an iterative lightweight transfer (“LWT”) process may be performed at
step712 in order to get the best set of data elements for each new product ID. Otherwise, the consumer information elements are retrieved from the
data repository102 using appropriate filters at
step714.
-
Once the
DBMS109 has retrieved the relevant consumer information, the consumer information elements may be merged (if appropriate), decrypted (if appropriate) and/or further filtered (if appropriate) at
step716. Then, at
step718, the resulting information elements are transmitted to the
vendor server114, for example, in the form of an XML data stream. The
vendor server114 receives and processes the consumer information elements at
step720. After processing the consumer information, the
vendor server114 transmits a delivery receipt acknowledgment to the
host server108 at
step722. The
host server108 may then pass an acknowledgment (success or failure) to the consumer (e.g., to the
wireless client device104 a or to another client device 104) at
step724. The exemplary generalized interaction diagram then ends at
step726.
-
As shown in
FIG. 8, information accounts 110 may be used in the context of one or more exchanges 802A&B. In this context, an exchange 802A&B may comprises a group of entities (e.g., vendor servers 114) that are authorized and configured to accept consumer information from a particular information account 110 at the request of the consumer. An
information account110 may, in some embodiments, be used to retrieve information for use in commerce with any vendor that is a member of the exchange 802A&B. An
information account110 may be accepted in one or more exchanges 802A&B according to various rules and relationships, as illustrated by the examples set forth herein. A consumer may also have several different information accounts 110, each valid for use in one or more exchanges.
-
An exchange may comprise a logical grouping of servers or other network devices, and those skilled in the art will appreciate that there are a variety of suitable methods for implementing logical groupings of network devices on a distributed network. For example, an exchange identifier may be used to identify an exchange and may be associated with each network device that is a member of that exchange. In such an embodiment, a look-up table of exchange identifiers may be maintained at the
host server108, within the
central data repository102 or at another suitable location and may be used to authenticate an exchange identifier used in connection with a request for access to an
information account110.
-
Exchanges 802A&B may be implemented, for example, through inflow and/or outflow constraints. An inflow constraint may, for example, dictate that only information accounts 110 associated with specific other exchanges will be accepted within an exchange or that no information accounts 110 associated with other exchanges will be accepted. An outflow constraint may dictate that information accounts 110 associated with an exchange may be used within that exchange and within no other exchanges (i.e., a private exchange), or within only selected other exchanges. Various business situations and partnerships may drive the implementation of inflow and outflow constraints.
-
In various embodiments, an
information account110 may be branded so as to be associated with a particular vendor or other entity, product or service. By way of example only, if a consumer creates an
information account110 via a website maintained on behalf of a particular vendor, e.g., “Vendor X,” the
information account110 may be branded as a “BrandX”
information account110X. A
BrandX information account110X may be stored in the central data repository in association with a BrandX identifier. BrandX logos or indicia may be displayed to the consumer when the consumer accesses the
BrandX information account110X. Thus, although Vendor X “sponsors” the
BrandX information account110X, the
central data repository102 that stores the
BrandX information account110X may be maintained by another entity.
-
An exchange 802A&B may be configured to accept one or more differently branded information accounts 110. This concept is similar to automated teller machine (ATM) networks, in which a customer of one bank may use his ATM card (e.g., debit or credit card) to conduct transactions at the ATM of another bank. Typically, an ATM card includes a number of logos (also referred to as “bugs”) that indicate the financial networks that will accept the ATM card. ATMs also display logos identifying the financial networks to which they are connected. Thus, a bank customer may have a Wachovia® ATM card that is accepted in all Honor and PLUS network ATMs. Similarly, the
various vendor servers114 that make up a particular exchange may include logos or other indicia indicating the brands of information accounts 110 that will be accepted.
-
With reference to
FIG. 8and
FIG. 9, a consumer interacting with a
browser112 of a
client device104 may be presented with a
web page file116Y by a
vendor server114Y maintained by Vendor Y. The displayed
web page file116Y may display an
enrollment application link902 that, when selected, will cause an enrollment application to be presented to the consumer. An enrollment application may be a form or other interface that prompts the consumer to input selected information. The website of Vendor Y may be configured, as described above, for interaction with the
central data repository102 via the
host server108. Furthermore, the
vendor server114Y may be a member of “Exchange B” 802B that also includes vendor server Z 114Z. For the sake of example only, it may be assumed that the inflow constraints of
Exchange B802B allow any member vendor server (114Y&Z) to accept BrandY information accounts 110Y, BrandZ information accounts 110Z and BrandX information accounts 110X.
-
The displayed
web page file116Y may thus display one or
more brand logos904 indicating the accepted brands of information accounts. The displayed
web page file116Y may also display one or
more exchange logos906 indicating the exchanges of which the
vendor server114Y is a member. In addition, the displayed
web page file116Y may display an access/create
link908 for allowing a consumer to access or create a BrandY information account 110Y. The displayed
web page file116Y of
FIG. 9is shown by way of example only and many other arrangements are possible. In perhaps a more practical example, the
brand logos904, the
exchange logos906 and the access/create
link908 might be presented to the consumer only if the consumer selects the
enrollment application link902. Other types of user interfaces may also be used.
-
When used in the context of a private exchange (e.g., an exchange that does not accept foreign information accounts 110) an information account may take the form of a “private” branded
information account110. As an example, if Vendor X establishes a private Exchange A 802A that offers a variety of financial services, a
BrandX information account110X may be established for consumers who participate in the private exchange. The
BrandX information account110X may be configured to store information that is relevant to the financial services offered by Vendor X. If appropriate outflow constraints are established, the
BrandX information account110X may be accepted only within private Exchange A 802A. Again, Vendor X may facilitate or otherwise sponsor the creation of the
BrandX information account110X, while another entity may server as the custodian of the
data repository102 for storing the
BrandX information account110X and provide the underlying information technology.
-
If private Exchange A 802A is not subject to outflow constraints, a
BrandX information account110X may also be accessed at websites hosted by or on behalf of other vendors, such as Vendor Y and/or Vendor Z. Consequently, an on-line form associated with Vendor Y web page files 116Y or Vendor Z web page files 116Z may automatically be populated based on information elements originating from the
BrandX information account110X. Similarly, if
Exchange A802A is subject to appropriate inflow constraints, a BrandY information account 110Y and a
BrandZ information account110Z may also be used at any website hosted by a
vendor server114X that is a member of the
Exchange A802A. In general, any number of vendors or other entities may participate in an exchange.
-
Various licensing arrangements and revenue sharing agreements may be established between the custodian of the
data repository102 and the vendors that configure their
vendor servers114 for interaction with information accounts 110. In particular, the custodian may choose to implement revenue sharing models in order to provide vendors with an incentive to promote and facilitate the creation and use of information accounts 110. The custodian may earn revenues in exchange for the service of providing access to information accounts 110 for completion of transactions. For example, the custodian may be paid a per transaction commission by the requesting exchange or vendor each time an
information account110 is used by a consumer to quickly fill out a form or other document for completing a transaction with a vendor. As another example, the custodian of the
data repository102 may receive revenue from the requesting exchange or vendor based on milestone transaction numbers. For example, the custodian may be paid a negotiated dollar amount for a negotiated number of transactions (e.g., $100 for every 500 transactions completed using an information account).
-
The more information accounts 110 that are in existence, the more transactions that are likely to occur in commerce. Accordingly, the custodian of the
data repository102 may choose to implement various revenue sharing models in order to financially encourage vendors and other entities to promote and/or sponsor information accounts 110. As an example, a revenue sharing model may specify that a lifetime revenue stream be paid to the originating vendor or entity that is credited with facilitating the creation of an
information account110. A lifetime revenue stream may be effective for the life of the
information account110 and may take the form of a credit issued to the originating vendor or entity each time that
information account110 is used to complete a transaction. A credit may amount to a percentage (anywhere from 0% to 100%) of the revenue earned by the custodian of the
data repository102 in connection with the transaction, or an otherwise arranged fee. Revenue sharing models may also specify that credits be paid by the custodian of the
data repository102 to a transacting vendor or entity that accepts consumer information elements from an
information account110 in order to complete a transaction.
-
In the context of exchanges and branded information accounts, the amounts credited to originating entities and transacting entities may vary depending on the particular exchange and/or which brand of branded information account was used in order to complete a transaction. For example, referring back to
FIG. 9, the custodian of the
central data repository102 may grant larger credits to a transacting vendor (Vendor X) when a BrandY information account 110Y (that is, an information account from another exchange) is used to complete a transaction through the
vendor server114X, as opposed to when a
BrandX information account110X (that is, an information account from the same exchange) is used to complete a transaction through the vendor server. As mentioned, any number of factors or business relationships may affect the revenue sharing models adopted by the custodian of the
central data repository102. As will be appreciated by those of skill in the art, different and/or multiple revenue sharing models may be applied to different exchanges or associated with differently branded information accounts. Members of an exchange may also choose to establish their own additional revenue sharing models, for example, in an attempt to maximize the acceptance of a branded information account.
-
Revenue sharing models may further include credits paid to OEMs, consultants, software providers and/or any other party who facilitates the creation and/or construction of an exchange, introduces information accounts 110 to an exchange, or otherwise assists the custodian of the
central data repository102 in increasing its revenue base.
- FIG. 10
is an abstract illustration of system components for implementing revenue sharing models in accordance with certain exemplary embodiments as disclosed herein. As shown, the
central data repository102 may store one or
more transaction logs1002 containing information relevant to any transaction that involved an
information account110. The
transaction log1002 may identify, for example, the date, time and nature of the transaction, the originating entity, the transacting entity, whether the
information account110 was branded, etc. Many alternatives for storing and identifying transaction information are possible in the context of the illustrated embodiment. For example, each
information account110 may include or have associated therewith a
unique transaction log1002. Alternatively, a
transaction log1002 may be used to store transaction information associated with multiple information accounts 110.
-
An
extraction module1004 may be used to facilitate the extraction of transaction information from a
transaction log1002. The
extraction module1004 may be executed by the
host server108 or by another network device that is in communication with the
host server108 or the
central data repository102. The
extraction module1004 may be employed to extract selected transaction information from the
transaction log1002 and to translate or transform the extracted transaction information into a format that can be interpreted by a
financial processing system1006. Thus, in certain embodiments, the
extraction module1004 may be configured to extract transaction data elements from a tagged data stream representing or associated with an
information account110. SOAP and/or other well-known protocols may be used by the
extraction module1004 to interface between the
transaction log1002 and the
financial processing system1006. The
financial processing system1006 may comprise any system for processing transaction information and revenue sharing models in order to ensure that the appropriate party is billed in connection with a transaction involving an information account and that revenues are shared with the appropriate parties. By way of example only, the financial processing system may be a custom software module or an off-the-shelf software package, such as the well-known “Oracle Financials” package.
-
Those skilled in the art will appreciate that the system components and arrangement thereof shown in
FIG. 10are by way of example only. Various other methods for recording and processing transaction information may be used in accordance with the concepts and principals discussed or suggested herein.
-
From a reading of the description above pertaining to various exemplary embodiments, many other modifications, features, embodiments and operating environments of the present invention will become evident to those of skill in the art. The features and aspects of the present invention have been described or depicted by way of example only and are therefore not intended to be interpreted as required or essential elements of the invention. It should be understood, therefore, that the foregoing relates only to certain exemplary embodiments of the invention, and that numerous changes and additions may be made thereto without departing from the spirit and scope of the invention as defined by any appended claims.
Claims (90)
1. A method for managing information in an environment that includes a host system, comprising:
receiving, at the host system, a signal to modify an electronic input interface;
modifying the electronic input interface at the host system to indicate entry of consumer profile information corresponding to the signal;
collecting, at the host system, the consumer profile information entered in the electronic input interface;
transferring the collected consumer profile information from the host system to a data repository for storage in an information account logically associated with an exchange, the exchange comprising a group of one or more servers authorized and configured to accept the consumer profile information from a particular information account upon request;
receiving, at the host system, a request from the exchange for consumer profile information associated with a specific information account; and
responding to the request at the host system by retrieving some of the consumer profile information from the data repository and conveying the retrieved consumer profile information to the requesting exchange, provided that the information account storing the consumer profile information is associated with the requesting exchange.
2. The method of
claim 1, wherein the electronic input interface comprises one or more of a web-enabled form, and a web page file having an input field.
3. The method of
claim 1, wherein the request is initiated from activity at a client device that is in communication with the exchange over the distributed network.
4. The method of
claim 1, further comprising maintaining a transaction log recording utilization of the information account to allow for compensation to an originating party with whom the information account is associated.
5. The method of
claim 1, further comprising encrypting some of the consumer profile information.
6. The method of
claim 5, further comprising decrypting some of the encrypted consumer profile information.
7. The method of
claim 1, further comprising:
receiving, at the host system, a query request;
causing a query of the data repository to be performed according to the query request;
receiving query results; and
providing the query results.
8. The method of
claim 7, further comprising causing the decryption of the query results.
9. The method of
claim 1, further comprising manipulating data elements in the information account based on input received from the consumer.
10. The method of
claim 1, further comprising controlling, at the host device, access to the information account.
11. A tangible computer-readable medium having stored thereon computer-executable instructions that, if executed by a computing device, cause the computing device to perform at least a portion of the method of
claim 1.
12. A system operable to perform the method of
claim 1, the system comprising:
the host system; and
the data repository where the information accounts are stored.
13. A method for managing information in an environment that includes a client device, comprising:
accessing, at the client device, an electronic input interface;
transmitting, with the client device, a signal to a host system associated with the electronic input interface by entering consumer profile information into the electronic input interface;
requesting creation of an information account for storage of the consumer profile information;
receiving, at the client device, authentication information from the host system; and
enabling access to some of the consumer profile information stored in the information account.
14. The method of
claim 13, wherein one or more of the accessing, transmitting, requesting and receiving processes is performed using wireless communication.
15. The method of
claim 13, wherein enabling access to some of the consumer profile information comprises transferring selected consumer profile information to the vendor, or allowing the vendor to access the information account.
16. The method of
claim 13, further comprising transmitting a request from the client device for authentication.
17. The method of
claim 16, wherein transmitting a request from the client device for authentication comprises signing on for authentication to access the information account.
18. The method of
claim 13, further comprising:
formulating a database query based upon information specified by the electronic input interface;
transmitting the database query;
receiving search results generated in connection with performance of the database query.
19. The method of
claim 18, further comprising translating the received search results into another form according to a predefined protocol.
20. The method of
claim 19, wherein translating the received search results into another form according to a predefined protocol comprises translating XML data into HTTP data using SOAP.
21. The method of
claim 13, wherein the client device executes a browser in order to interact with the electronic input interface.
22. A wireless communication device that is programmed to perform at least a portion of the method of
claim 13.
23. The wireless communication device of
claim 22, wherein the wireless communication device comprises one of a personal digital assistant (PDA), digital and/or cellular telephone or pager, a handheld computer, a mobile wireless communication device.
24. A method for data management, the method comprising:
storing a consumer information account that comprises first and second data aggregates, the first data aggregate including a consumer information element that constitutes the same data as a consumer information element of the second data aggregate;
flagging each of the consumer information elements to indicate that both consumer information elements constitute the same data;
updating the consumer information element of the first data aggregate in response to a request; and
delaying a corresponding update to the information element of the second data aggregate until the next time the information account is accessed, so that a data inconsistency in the information account is allowed to exist for a period of time.
25. The method of
claim 24, further comprising maintaining a transaction log for each redundantly stored data aggregate to record the time and date of the most recent update for each data aggregate.
26. The method of
claim 25, wherein:
each time a request is made to access the information account, the transaction log is first examined to determine which redundant data element was most recently updated;
all redundant data elements are updated to be consistent with the redundant data element that was most recently updated; and
the request to access the information account is granted.
27. The method of
claim 24, wherein the first data aggregate represents a primary profile record of a consumer, and the second data aggregate includes information about an information product.
28. A tangible computer-readable medium having stored thereon computer-executable instructions that, if executed by a computing device, cause the computing device to perform at least a portion of the method of
claim 24.
29. A consumer information account for storing consumer information elements, comprising:
a primary record configured to store a plurality of general consumer information elements about a consumer; and
one or more secondary records that each store consumer information elements that are specific to a particular product or service associated with a vendor, the one or more secondary records and the primary record being stored in a data repository accessible by a database management system.
30. The consumer information account of
claim 29, wherein each of the records is stored in a tagged data format.
31. The consumer information account of
claim 29, wherein each of the records is represented by a data aggregate.
32. The consumer information account of
claim 29, wherein one or more of the records are implemented as a discrete XML aggregate.
33. The consumer information account of
claim 29, wherein data aggregates representing the one or more secondary records include one or more of Home Loan, Auto Loan, Student Loan, Home Insurance, Auto Insurance, Life Insurance, Online Banking, Credit Card, Government Services, Education, Career, Travel, Retail, and Relocation.
34. The consumer information account of
claim 29, wherein the consumer information account is modifiable to include additional records.
35. A server programmed to manage consumer information, the server comprising:
a database management system programmed to:
receive, from one or more network devices, requests for access to a plurality of consumer information accounts stored in a data repository accessible to the database management system, each request including consumer authentication information;
authenticate or deny each request based on the consumer authentication information; and
for each authenticated request, transmit one or more consumer information elements from the corresponding consumer information account to the requesting network device;
a first authentication table including data that correlates each of one or more temporary authorizations with a different set of consumer-defined attributes, each of the different set of consumer-defined attributes defining access privileges to a corresponding consumer information account that will be granted to an entity that presents the temporary authorization to the host server; and
an authentication module programmed to:
compare each temporary authorization presented to the host server to the data in the first authentication table to determine a level of access to grant to the entity that presents the temporary authorization; and
grant the level of access subsequent to receipt of the temporary authorization.
36. The server of
claim 35, wherein the database management system is programmed to formulate and perform a database query based upon information received.
37. The server of
claim 36, wherein the database management system is programmed to perform the query only after an authentication process has been performed by the database management system.
38. The server of
claim 35, wherein the database management system is programmed to decrypt a search result obtained in connection with performance of a database query.
39. The server of
claim 35, wherein the search result is in the form of XML data filtered from an information account.
40. A system comprising:
a transaction log stored in a data repository and associated with one or more consumer information accounts stored in the data repository, wherein the transaction log records information relevant to transactions that involve the one or more associated consumer information accounts; and
an extraction module programmed to extract transaction information from the transaction log and translate the extracted transaction information into a format that can be interpreted by a financial processing system;
wherein the system is configured to process the transaction information to ensure that revenue generated by a transaction that involves one of the one or more associated consumer information accounts is shared with an entity that facilitated creation of the one of the one or more associated consumer information accounts.
41. The system of
claim 40, wherein the extraction module is programmed to extract transaction data elements from a tagged data stream.
42. The system of
claim 40, wherein the extraction module uses the SOAP protocol to interface between the transaction log and the financial processing system.
43. A method, comprising:
storing consumer profile information in each of a plurality of information accounts on behalf of a plurality of exchanges, each of said exchanges comprising a logical grouping of one or more servers communicating with user devices over a distributed network, and each information account being affiliated with at least one of said exchanges;
applying a transformation mechanism to data in one or more information accounts so that only specified data elements are extracted from the information account;
retrieving the specified data elements from the consumer profile information and conveying the retrieved data elements to said exchanges in response to requests from servers within said exchanges resulting from consumer-initiated requests requiring use of the consumer profile information; and
imposing fees for conveying consumer profile information to the exchanges.
44. The method of
claim 43, wherein imposing fees for conveying consumer profile information to the exchanges comprises imposing a fixed or varying fee for each transaction involving conveyance of consumer profile information to the exchanges.
45. The method of
claim 43, wherein imposing fees for conveying consumer profile information to the exchanges comprises imposing a fixed or varying fee for each group of transactions involving conveyance of consumer profile information to the exchanges.
46. The method of
claim 43, further comprising:
an obtaining consumer profile information through the servers of said exchanges, and creating new information accounts thereby;
identifying an originating vendor or entity each time a new information account is created; and
compensating the originating vendor or entity for each transaction involving conveyance of consumer profile information from an information account identified with the originating vendor or entity.
47. The method of
claim 46, wherein compensating the originating vendor or entity for each transaction involving conveyance of consumer profile information comprises providing the originating vendor or entity with a credit against any fee imposed for conveying consumer profile information on behalf of the vendor or entity.
48. The method of
claim 46, wherein imposing fees for conveying consumer profile information to the exchanges comprises:
imposing a first fixed or varying fee for each transaction involving conveyance of consumer profile information to an exchange associated with the originating vendor or entity of the information account storing the consumer profile information; and
imposing a second fixed or varying fee, higher than said first fixed or varying fee, for each transaction involving conveyance of consumer profile information to an exchange not associated with the originating vendor or entity.
49. A method, comprising:
gathering consumer profile information at each of a plurality of exchanges, each exchange comprising a logical grouping of one or more servers communicating with user devices over a distributed network;
normalizing some of the consumer profile information into a plurality of discrete data aggregates;
sending, from each exchange and over the distributed network, the normalized consumer profile information to a shared data repository for storage in information accounts associated with the originating exchange; and
receiving, at each exchange, normalized consumer profile information from the exchange's shared data repository in response to consumer-initiated requests requiring use of the consumer profile information.
50. A method for managing consumer information, comprising:
storing a branded information account in a data repository accessible via a distributed network, the branded information account comprising a plurality of consumer information elements associated with a consumer and identifying a sponsor of the branded information account;
receiving, over the distributed network, a request from a network device for one or more selected consumer information elements, the request including consumer authentication information and being made by the network device responsive to an input command; and
in response to the request:
performing an authentication process using the authentication information;
retrieving the selected consumer information elements from the branded information account, wherein retrieving the selected consumer information elements includes applying a transformation mechanism to data in the branded information account so that only the requested consumer information elements are extracted from the information account; and
transmitting the selected consumer information elements, over the distributed network, to the network device.
51. The method of
claim 50, wherein the sponsor of the branded information account comprises a vendor or entity that facilitated creation of the branded information account.
52. A tangible computer-readable medium having stored thereon computer-executable instructions that, if executed by a computing device, cause the computing device to perform at least a portion of the method of
claim 50.
53. The method of
claim 50, wherein the network device comprises a vendor server operable to interact with a client device, the vendor server operable to execute a server-side application for interacting with a database management system that manages the data repository, and wherein:
the vendor server is a member of an exchange comprising a logical grouping of servers authorized to interact with branded information accounts;
the request further includes an exchange identifier for identifying the exchange; and
in response to the request, the exchange identifier is authenticated to ensure that the exchange is authorized to interact with the branded information account, prior to transmitting the selected consumer information elements to the network device.
54. The method of
claim 53, wherein the branded information account is valid only within the exchange and not within any other exchanges.
55. The method of
claim 53, wherein the branded information account is valid within the exchange and within at least one other specified exchange.
56. The method of
claim 53, wherein the server-side application receives the selected consumer information elements from the database management system and integrates the selected consumer information elements into a business process on behalf of the consumer.
57. A tangible computer-readable medium having stored thereon computer-executable instructions that, if executed by a computing device, cause the computing device to perform at least a portion of the method of
claim 56.
58. The method of
claim 56, wherein integrating the selected consumer information elements into the business process comprises:
auto-populating the selected consumer information elements into at least one input field of an editable web page file;
transmitting the auto-populated web page file to the client device for display to the consumer;
in response to a submit command received from the client device, passing the selected consumer information elements to a processing module executed by the vendor server; and
transmitting any edited or added consumer information elements to the database management system for appropriate updating of the branded information account.
59. A tangible computer-readable medium having stored thereon computer-executable instructions that, if executed by a computing device, cause the computing device to perform at least a portion of the method of
claim 58.
60. The method of
claim 50, wherein the network device comprises a client device executing a browser for interacting with a web page file hosted by a vendor server, and wherein:
the web page file includes an instruction that causes the browser to request transmission of a temporary client-side application configured to manage the request/response process for the client device;
the vendor server is a member of an exchange comprising a logical grouping of servers authorized to interact with one or more branded information accounts;
the request from the network device further includes an exchange identifier for identifying the exchange; and
in response to the request, the exchange identifier is authenticated to ensure that the exchange is authorized to interact with the branded information account, prior to transmitting to the selected consumer information elements to the network device.
61. The method of
claim 60, wherein the client-side application executes a communication protocol for communicating with a database management system that manages the data repository.
62. The method of
claim 60, wherein:
the client-side application receives the selected consumer information elements and auto-populates the selected consumer information elements into at least one input field of the web page file; and
the web page file is submitted to the vendor server for processing of the selected consumer information elements.
63. A tangible computer-readable medium having stored thereon computer-executable instructions that, if executed by a computing device, cause the computing device to perform at least a portion of the method of
claim 62.
64. The method of
claim 50, wherein:
the selected consumer information is used to complete a transaction; and
the method further comprises:
maintaining a transaction log indicating an originating vendor credited with facilitating origination of the branded information account and a transacting vendor credited with using the branded information account to complete the transaction; and
sharing revenue received in connection with the transaction with the originating vendor and the transacting vendor according to a revenue sharing model.
65. The method of
claim 64, wherein the revenue sharing model specifies that the revenue shared with the originating vendor or the transacting vendor comprises a specified percentage of the revenue received in connection with the transaction.
66. The method of
claim 50, wherein the consumer information elements are stored in the data repository in a tagged data format.
67. A method for managing consumer information, comprising:
storing an information account in a central data repository accessible via the distributed network, the information account comprising a plurality of consumer information elements associated with a consumer and identifying a sponsor of the information account;
normalizing some of the consumer information elements into one or more discrete data aggregates;
receiving, over the distributed network, a request from a client device for one or more selected consumer information elements, the client device interacting with a web page file hosted by a vendor server, the vendor server being a member of an exchange comprising a logical grouping of servers authorized to interact with one or more information accounts, the request including consumer authentication information and an exchange identifier and being made by the client device responsive to an input command supplied by the consumer; and
in response to the request, authenticating the client device using the authentication information by:
authenticating the exchange identifier to ensure that the exchange is authorized to interact with the information account;
retrieving the selected consumer information elements from the information account, where retrieving the selected consumer information elements includes applying a transformation mechanism to data in the information account so that only the requested consumer information elements are extracted from the information account; and
transmitting the selected consumer information elements, over the distributed network, to the client device.
68. A tangible computer-readable medium having stored thereon computer-executable instructions that, if executed by a computing device, cause the computing device to perform at least a portion of the method of
claim 67.
69. The method of
claim 67, wherein information account is valid only within the exchange and not within any other exchanges.
70. The method of
claim 67, wherein the information account is valid within the exchange and within at least one other exchange.
71. The method of
claim 67, wherein the network device auto-populates the selected consumer information elements into web-page file displayed to the consumer.
72. The method of
claim 67, wherein:
the selected consumer information elements are used to complete a transaction;
the central data repository maintains a transaction log indicating an originating vendor credited with facilitating creation of the information account and a transacting vendor credited with using the information account to complete the transaction; and
the method further comprises sharing revenue received in connection with the transaction with the originating vendor and the transacting vendor according to a revenue sharing model.
73. A tangible computer-readable medium having stored thereon computer-executable instructions that, if executed by a computing device, cause the computing device to perform at least a portion of the method of
claim 72.
74. The method of
claim 72, wherein the revenue sharing model specifies that the revenue shared with the originating vendor or the transacting vendor comprises a specified percentage of the revenue received in connection with the transaction.
75. The method of
claim 67, wherein the consumer information elements are stored in the central data repository in a tagged data format.
76. A method for managing consumer information, comprising:
storing an information account in a central data repository accessible via a distributed network, the information account having been created via a website associated with an originating vendor;
encrypting a plurality of consumer information elements and storing the plurality of consumer information elements in the information account;
receiving, over the distributed network, a request from a network device for one or more selected consumer information elements, the request including consumer authentication information and being made by the network device responsive to an input command;
in response to the request, authenticating the consumer based on the authentication information, retrieving the selected consumer information elements from the information account, and transmitting the selected consumer information elements, over the distributed network, to the network device;
wherein the network device auto-populates the consumer information elements into a web page file displayed to the consumer for optional editing by the consumer and for submission to a business process, associated with a vendor, for completion of a transaction; and
in response to receiving, over the distributed electronic network, an acknowledgment from the network device that the transaction has been completed, sharing any revenue received in connection with the transaction with the originating vendor and the transacting vendor according to a revenue sharing model.
77. A tangible computer-readable medium having stored thereon computer-executable instructions that, if executed by a computing device, cause the computing device to perform at least a portion of the method of
claim 76.
78. The method of
claim 76, wherein the revenue sharing model specifies that the revenue shared with the originating vendor or the transacting vendor comprises a specified percentage of the revenue received in connection with the transaction.
79. The method of
claim 76, wherein:
the network device comprises a vendor server interacting with a client device, the vendor server executing a server-side application for interacting with a database management system that manages the central data repository;
the vendor server is a member of an exchange comprising a logical grouping of servers authorized to interact with one or more information accounts;
the request further includes an exchange identifier for identifying the exchange; and
in response to the request, the exchange identifier is authenticated to ensure that the exchange is authorized to interact with the information account, prior to transmitting to the selected consumer information elements to the network device.
80. A tangible computer-readable medium having stored thereon computer-executable instructions that, if executed by a computing device, cause the computing device to perform at least a portion of the method of
claim 79.
81. The method of
claim 79, wherein the information account is valid only within the exchange and not within any other exchanges.
82. The method of
claim 79, wherein the information account is valid within the exchange and within at least one other exchange.
83. The method of
claim 76, wherein:
the network device comprises a client device executing a browser for interacting with the web page file hosted by a vendor server;
the web page file includes an instruction that causes the browser to request transmission of a temporary client-side application configured to manage the request/response process for the client device;
the vendor server is a member of an exchange comprising a logical grouping of servers authorized to interact with one or more differently branded information accounts;
the request from the network device further includes an exchange identifier for identifying the exchange; and
in response to the request, the exchange identifier is authenticated to ensure that the exchange is authorized to interact with the information account, prior to transmitting to the selected consumer information elements to the network device.
84. The method of
claim 76, wherein the consumer information elements are stored in the central data repository in a tagged data format.
85. A system for managing consumer information, comprising:
a data repository for storing a plurality of information accounts accessible via a distributed network, the information accounts each comprising a plurality of consumer information elements associated with a consumer;
a host server in communication with the distributed network and hosting a database management system for interacting with the data repository;
at least one exchange comprising a logical grouping of vendor servers in communication with the distributed network and authorized to interact with one or more of the information accounts;
a client device in communication with the distributed network and executing a browser for interacting with a web page file associated with a vendor server;
wherein the client device requests from the host server one or more selected consumer information elements from the information account of the consumer, the request including consumer authentication information and an exchange identifier identifying the exchange of which the vendor server is a member; and
wherein in response to the request from the client device, the host server authenticates the consumer based on the authentication information, authenticates the exchange identifier to ensure that the exchange is authorized to interact with the information account of the consumer, retrieves the selected consumer information elements from the information account of the consumer, and transmits the selected consumer information elements, over the distributed network, to the client device.
86. The system of
claim 85, wherein the web page file includes an instruction that causes the browser to request transmission of a temporary client-side application configured to manage the request/response process for the client device.
87. The system of
claim 86, wherein the client-side application executes a communication protocol for communicating with the database management system that interacts with the data repository.
88. The system of
claim 86, wherein:
the selected consumer information elements are auto-populated into input fields of a web page displayed by the client device, the selected consumer information elements being used by the vendor server to complete a transaction; and
in response to the receiving an acknowledgment that the transaction is complete, the host server stores in a transaction log transaction information associating the transaction with an originating vendor credited with facilitating creation of the information account and a transacting vendor credited with using the information account to complete the transaction, so that any revenue received in connection with the transaction may be shared with the originating vendor and the transacting vendor according to a revenue sharing model.
89. The system of
claim 88, wherein the revenue sharing model specifies that the revenue shared with the originating vendor or the transacting vendor comprises a specified percentage of the revenue received in connection with the transaction.
90. The system of
claim 85, wherein the consumer information elements are stored in the data repository in a tagged data format.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/434,803 US20090210293A1 (en) | 2000-08-04 | 2009-05-04 | Information transactions over a network |
US14/941,528 US20160140582A1 (en) | 2000-08-04 | 2015-11-13 | Information transactions over a network |
Applications Claiming Priority (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US22323200P | 2000-08-04 | 2000-08-04 | |
US22611700P | 2000-08-18 | 2000-08-18 | |
US23884700P | 2000-10-06 | 2000-10-06 | |
US24586700P | 2000-11-07 | 2000-11-07 | |
US25329800P | 2000-11-27 | 2000-11-27 | |
US09/923,285 US7257581B1 (en) | 2000-08-04 | 2001-08-06 | Storage, management and distribution of consumer information |
US09/933,567 US7467141B1 (en) | 2000-08-04 | 2001-08-20 | Branding and revenue sharing models for facilitating storage, management and distribution of consumer information |
US09/974,766 US7016875B1 (en) | 2000-08-04 | 2001-10-09 | Single sign-on for access to a central data repository |
US09/988,811 US8566248B1 (en) | 2000-08-04 | 2001-11-20 | Initiation of an information transaction over a network via a wireless device |
US12/434,803 US20090210293A1 (en) | 2000-08-04 | 2009-05-04 | Information transactions over a network |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/988,811 Continuation US8566248B1 (en) | 2000-08-04 | 2001-11-20 | Initiation of an information transaction over a network via a wireless device |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/941,528 Division US20160140582A1 (en) | 2000-08-04 | 2015-11-13 | Information transactions over a network |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090210293A1 true US20090210293A1 (en) | 2009-08-20 |
Family
ID=46332176
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/988,811 Expired - Fee Related US8566248B1 (en) | 2000-08-04 | 2001-11-20 | Initiation of an information transaction over a network via a wireless device |
US12/434,803 Abandoned US20090210293A1 (en) | 2000-08-04 | 2009-05-04 | Information transactions over a network |
US14/941,528 Abandoned US20160140582A1 (en) | 2000-08-04 | 2015-11-13 | Information transactions over a network |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/988,811 Expired - Fee Related US8566248B1 (en) | 2000-08-04 | 2001-11-20 | Initiation of an information transaction over a network via a wireless device |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/941,528 Abandoned US20160140582A1 (en) | 2000-08-04 | 2015-11-13 | Information transactions over a network |
Country Status (1)
Country | Link |
---|---|
US (3) | US8566248B1 (en) |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030110374A1 (en) * | 2001-04-19 | 2003-06-12 | Masaaki Yamamoto | Terminal communication system |
US20080086394A1 (en) * | 2006-06-29 | 2008-04-10 | Carina Technology, Inc. | System and method for controlling a utility meter |
US20080109528A1 (en) * | 2004-12-06 | 2008-05-08 | Omnifone Limited | Method of Providing Content to a Wireless Computing Device |
US8117649B2 (en) | 2002-06-06 | 2012-02-14 | Dormarke Assets Limited Liability Company | Distributed hierarchical identity management |
US8260806B2 (en) | 2000-08-04 | 2012-09-04 | Grdn. Net Solutions, Llc | Storage, management and distribution of consumer information |
US8402525B1 (en) * | 2005-07-01 | 2013-03-19 | Verizon Services Corp. | Web services security system and method |
US8504704B2 (en) | 2004-06-16 | 2013-08-06 | Dormarke Assets Limited Liability Company | Distributed contact information management |
US8527752B2 (en) | 2004-06-16 | 2013-09-03 | Dormarke Assets Limited Liability | Graduated authentication in an identity management system |
US8566248B1 (en) | 2000-08-04 | 2013-10-22 | Grdn. Net Solutions, Llc | Initiation of an information transaction over a network via a wireless device |
US20130301626A1 (en) * | 2012-01-11 | 2013-11-14 | Saguna Networks Ltd. | Methods, circuits, devices, systems and associated computer executable code for facilitating access to a content source through a wireless mobile network |
US20150127771A1 (en) * | 2012-05-08 | 2015-05-07 | Nokia Solutions And Networks Oy | Method and Apparatus |
US9047456B2 (en) | 2012-03-20 | 2015-06-02 | Canon Information And Imaging Solutions, Inc. | System and method for controlling access to a resource |
US9087105B2 (en) * | 2012-10-04 | 2015-07-21 | Adobe Systems Incorporated | Rule-based extraction, transformation, and loading of data between disparate data sources |
US9245266B2 (en) | 2004-06-16 | 2016-01-26 | Callahan Cellular L.L.C. | Auditable privacy policies in a distributed hierarchical identity management system |
WO2016025222A1 (en) * | 2014-08-12 | 2016-02-18 | Danal Inc. | An aggregator system having a platform for engaging mobile device users |
US9454773B2 (en) | 2014-08-12 | 2016-09-27 | Danal Inc. | Aggregator system having a platform for engaging mobile device users |
US9461983B2 (en) | 2014-08-12 | 2016-10-04 | Danal Inc. | Multi-dimensional framework for defining criteria that indicate when authentication should be revoked |
US20160315994A1 (en) * | 2015-04-22 | 2016-10-27 | Teruten, Inc. | Virtual browsing method using application and operation server |
US9928508B2 (en) | 2000-08-04 | 2018-03-27 | Intellectual Ventures I Llc | Single sign-on for access to a central data repository |
US20180121633A1 (en) * | 2000-11-10 | 2018-05-03 | Oath Inc. | Digital content distribution and subscription sysem |
US10154082B2 (en) | 2014-08-12 | 2018-12-11 | Danal Inc. | Providing customer information obtained from a carrier system to a client device |
US10515090B2 (en) * | 2014-10-29 | 2019-12-24 | Jpmorgan Chase Bank, N.A. | Data extraction and transformation method and system |
US20200082435A1 (en) * | 2018-09-06 | 2020-03-12 | Karleigh Jackson | Win draw system and method |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101599951A (en) * | 2008-06-06 | 2009-12-09 | 阿里巴巴集团控股有限公司 | A method, device and system for publishing website information |
EP2556451A4 (en) * | 2010-04-06 | 2016-09-07 | Webtrends Inc | Method and system for defining and populating segments |
US20140149243A1 (en) * | 2012-11-29 | 2014-05-29 | Red Hat, Inc. | Vendor download integration |
US9807085B2 (en) * | 2013-03-15 | 2017-10-31 | Veracode, Inc. | Systems and methods for automated detection of login sequence for web form-based authentication |
US9658996B2 (en) * | 2014-09-10 | 2017-05-23 | Microsoft Technology Licensing, Llc | Mapping account information to server authentication |
US10158628B2 (en) | 2016-06-08 | 2018-12-18 | Bank Of America Corporation | Preventing unauthorized access to secured information systems based on contextual login information |
US10158629B2 (en) | 2016-06-20 | 2018-12-18 | Bank Of America Corporation | Preventing unauthorized access to secured information systems using multi-device authentication techniques |
US10503545B2 (en) | 2017-04-12 | 2019-12-10 | At&T Intellectual Property I, L.P. | Universal security agent |
US11223612B2 (en) * | 2017-10-23 | 2022-01-11 | Network Platform Technologies Limited | End to end secure identification and verification of users for organizations on multitenant platform |
US10944745B2 (en) | 2018-12-06 | 2021-03-09 | Bank Of America Corporation | System and method for device and transaction authentication |
US10986079B2 (en) | 2018-12-06 | 2021-04-20 | Bank Of America Corporation | System and method for hierarchical decisioning within a hybrid blockchain |
US11252139B2 (en) | 2019-02-26 | 2022-02-15 | Bank Of America Corporation | Distributed authentication/authorization tool |
US20220270185A1 (en) * | 2021-02-23 | 2022-08-25 | Diskuv, Inc. | Survivor assault matching process |
US11528153B1 (en) * | 2022-05-27 | 2022-12-13 | Vouch.Io Llc | Systems and methods for delayed-message attack mitigation |
Citations (84)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4780821A (en) * | 1986-07-29 | 1988-10-25 | International Business Machines Corp. | Method for multiple programs management within a network having a server computer and a plurality of remote computers |
US5644723A (en) * | 1989-05-01 | 1997-07-01 | Credit Verification Corporation | Method and system for selective incentive point-of-sale marketing in response to customer shopping histories |
US5677955A (en) * | 1995-04-07 | 1997-10-14 | Financial Services Technology Consortium | Electronic funds transfer instruments |
US5737701A (en) * | 1995-10-03 | 1998-04-07 | At&T Corp. | Automatic authentication system |
US5774551A (en) * | 1995-08-07 | 1998-06-30 | Sun Microsystems, Inc. | Pluggable account management interface with unified login and logout and multiple user authentication services |
US5794259A (en) * | 1996-07-25 | 1998-08-11 | Lextron Systems, Inc | Apparatus and methods to enhance web browsing on the internet |
US5815665A (en) * | 1996-04-03 | 1998-09-29 | Microsoft Corporation | System and method for providing trusted brokering services over a distributed network |
US5855007A (en) * | 1995-11-15 | 1998-12-29 | Jovicic; Neboisa | Electronic coupon communication system |
US5872850A (en) * | 1996-02-02 | 1999-02-16 | Microsoft Corporation | System for enabling information marketplace |
US5911141A (en) * | 1995-11-07 | 1999-06-08 | International Business Machines Corporation | On-line hierarchical form records identification |
US5953710A (en) * | 1996-10-09 | 1999-09-14 | Fleming; Stephen S. | Children's credit or debit card system |
US5983208A (en) * | 1996-06-17 | 1999-11-09 | Verifone, Inc. | System, method and article of manufacture for handling transaction results in a gateway payment architecture utilizing a multichannel, extensible, flexible architecture |
US5995965A (en) * | 1996-11-18 | 1999-11-30 | Humetrix, Inc. | System and method for remotely accessing user data records |
US6005939A (en) * | 1996-12-06 | 1999-12-21 | International Business Machines Corporation | Method and apparatus for storing an internet user's identity and access rights to world wide web resources |
US6009410A (en) * | 1997-10-16 | 1999-12-28 | At&T Corporation | Method and system for presenting customized advertising to a user on the world wide web |
US6012044A (en) * | 1997-12-10 | 2000-01-04 | Financial Engines, Inc. | User interface for a financial advisory system |
US6026166A (en) * | 1997-10-20 | 2000-02-15 | Cryptoworx Corporation | Digitally certifying a user identity and a computer system in combination |
US6029141A (en) * | 1997-06-27 | 2000-02-22 | Amazon.Com, Inc. | Internet-based customer referral system |
US6052710A (en) * | 1996-06-28 | 2000-04-18 | Microsoft Corporation | System and method for making function calls over a distributed network |
US6073106A (en) * | 1998-10-30 | 2000-06-06 | Nehdc, Inc. | Method of managing and controlling access to personal information |
US6125352A (en) * | 1996-06-28 | 2000-09-26 | Microsoft Corporation | System and method for conducting commerce over a distributed network |
US6131096A (en) * | 1998-10-05 | 2000-10-10 | Visto Corporation | System and method for updating a remote database in a network |
US6154768A (en) * | 1998-03-30 | 2000-11-28 | International Business Machines Corporation | System and method for negotiating functions and features |
US6192380B1 (en) * | 1998-03-31 | 2001-02-20 | Intel Corporation | Automatic web based form fill-in |
US6199079B1 (en) * | 1998-03-09 | 2001-03-06 | Junglee Corporation | Method and system for automatically filling forms in an integrated network based transaction environment |
US6208659B1 (en) * | 1997-12-22 | 2001-03-27 | Nortel Networks Limited | Data processing system and method for providing personal information in a communication network |
US6233608B1 (en) * | 1997-12-09 | 2001-05-15 | Openwave Systems Inc. | Method and system for securely interacting with managed data from multiple devices |
US6243688B1 (en) * | 1997-04-14 | 2001-06-05 | Dyan T. Kalina | Internet-based credit interchange system of converting purchase credit awards through credit exchange system for purchase of investment vehicle |
US6247029B1 (en) * | 1998-05-01 | 2001-06-12 | International Business Machines Corporation | Web browser form enhancements |
US6253203B1 (en) * | 1998-10-02 | 2001-06-26 | Ncr Corporation | Privacy-enhanced database |
US20010011250A1 (en) * | 1997-11-12 | 2001-08-02 | Cris T. Paltenghe | Distributed network based electronic wallet |
US20010018675A1 (en) * | 1998-02-17 | 2001-08-30 | Blaze Matthew A. | Method and apparatus for compliance checking in a trust-management system |
US6285983B1 (en) * | 1998-10-21 | 2001-09-04 | Lend Lease Corporation Ltd. | Marketing systems and methods that preserve consumer privacy |
US6289333B1 (en) * | 1998-01-16 | 2001-09-11 | Aspect Communications Corp. | Methods and apparatus enabling dynamic resource collaboration when collaboration session host is distinct from resource host |
US6298347B1 (en) * | 1998-08-25 | 2001-10-02 | Numoda Corporation | System and method for remote data entry |
US6308203B1 (en) * | 1997-10-14 | 2001-10-23 | Sony Corporation | Information processing apparatus, information processing method, and transmitting medium |
US20010039586A1 (en) * | 1999-12-06 | 2001-11-08 | Leonard Primak | System and method for dynamic content routing |
US6321339B1 (en) * | 1998-05-21 | 2001-11-20 | Equifax Inc. | System and method for authentication of network users and issuing a digital certificate |
US20010047276A1 (en) * | 2000-03-27 | 2001-11-29 | Fritz Eisenhart | Business to business technology exchange and collaboration system and method |
US6327578B1 (en) * | 1998-12-29 | 2001-12-04 | International Business Machines Corporation | Four-party credit/debit payment protocol |
US20020002684A1 (en) * | 1998-05-01 | 2002-01-03 | Barbara L. Fox | Intelligent trust management method and system |
US20020029201A1 (en) * | 2000-09-05 | 2002-03-07 | Zeev Barzilai | Business privacy in the electronic marketplace |
US6356905B1 (en) * | 1999-03-05 | 2002-03-12 | Accenture Llp | System, method and article of manufacture for mobile communication utilizing an interface support framework |
US20020033528A1 (en) * | 1998-11-16 | 2002-03-21 | Nec Corporation | Multichip module and method for manufacturing |
US20020049912A1 (en) * | 2000-10-20 | 2002-04-25 | Shinsuke Honjo | Access control method |
US6385596B1 (en) * | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system |
US6401085B1 (en) * | 1999-03-05 | 2002-06-04 | Accenture Llp | Mobile communication and computing system and method |
US20020078233A1 (en) * | 2000-05-12 | 2002-06-20 | Alexandros Biliris | Method and apparatus for content distribution network brokering and peering |
US20020107972A1 (en) * | 2000-09-19 | 2002-08-08 | Keane Kerry C. | System and method for distributing media content |
US20020152179A1 (en) * | 2000-10-27 | 2002-10-17 | Achiezer Racov | Remote payment method and system |
US20020154157A1 (en) * | 2000-04-07 | 2002-10-24 | Sherr Scott Jeffrey | Website system and process for selection and delivery of electronic information on a network |
US6491217B2 (en) * | 2001-03-31 | 2002-12-10 | Koninklijke Philips Electronics N.V. | Machine readable label reader system with versatile response selection |
US6496855B1 (en) * | 1999-03-02 | 2002-12-17 | America Online, Inc. | Web site registration proxy system |
US20020198818A1 (en) * | 2000-05-16 | 2002-12-26 | Pcorder.Com | Method and apparatus for efficiently generating electronic requests for quote |
US20030018587A1 (en) * | 2001-07-20 | 2003-01-23 | Althoff Oliver T. | Checkout system for on-line, card present equivalent interchanges |
US20030079123A1 (en) * | 2000-03-08 | 2003-04-24 | Joan-Maria Mas Ribes | Mobile code and method for resource management for mobile code |
US6571279B1 (en) * | 1997-12-05 | 2003-05-27 | Pinpoint Incorporated | Location enhanced information delivery system |
US6571285B1 (en) * | 1999-12-23 | 2003-05-27 | Accenture Llp | Providing an integrated service assurance environment for a network |
US6584448B1 (en) * | 1998-09-25 | 2003-06-24 | Catalina Marketing International, Inc. | Method of and system for distributing and redeeming electronic coupons |
US6606643B1 (en) * | 2000-01-04 | 2003-08-12 | International Business Machines Corporation | Method of automatically selecting a mirror server for web-based client-host interaction |
US20030154306A1 (en) * | 2002-02-11 | 2003-08-14 | Perry Stephen Hastings | System and method to proxy inbound connections to privately addressed hosts |
US20030163733A1 (en) * | 2002-02-28 | 2003-08-28 | Ericsson Telefon Ab L M | System, method and apparatus for federated single sign-on services |
US6665704B1 (en) * | 1999-06-18 | 2003-12-16 | Sun Microsystems, Inc. | Bounding delays and reducing threading overheads in caching |
US6714916B1 (en) * | 1997-11-02 | 2004-03-30 | Amazon.Com, Inc. | Crossing paths notification service |
US6725050B1 (en) * | 2000-05-25 | 2004-04-20 | Sprint Communications Company L.P. | Wireless communication system for an enterprise |
US6751735B1 (en) * | 1998-03-23 | 2004-06-15 | Novell, Inc. | Apparatus for control of cryptography implementations in third party applications |
US20040225883A1 (en) * | 2003-05-07 | 2004-11-11 | Weller Michael K. | Method and apparatus providing multiple single levels of security for distributed processing in communication systems |
US20050010653A1 (en) * | 1999-09-03 | 2005-01-13 | Fastforward Networks, Inc. | Content distribution system for operation over an internetwork including content peering arrangements |
US6845370B2 (en) * | 1998-11-12 | 2005-01-18 | Accenture Llp | Advanced information gathering for targeted activities |
US20050015340A1 (en) * | 2003-06-27 | 2005-01-20 | Oracle International Corporation | Method and apparatus for supporting service enablers via service request handholding |
US6865426B1 (en) * | 1997-10-28 | 2005-03-08 | Georgia Tech Research Corporation | Adaptive data security systems and methods |
US6879965B2 (en) * | 2000-03-01 | 2005-04-12 | Passgate Corporation | Method, system and computer readable medium for web site account and e-commerce management from a central location |
US6944677B1 (en) * | 2000-05-09 | 2005-09-13 | Aspect Communications Corporation | Common user profile server and method |
US20060031489A1 (en) * | 2004-04-21 | 2006-02-09 | Microsoft Corporation | Smart shares and transports |
US20060106734A1 (en) * | 1994-11-28 | 2006-05-18 | Ned Hoffman | System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse |
US7100195B1 (en) * | 1999-07-30 | 2006-08-29 | Accenture Llp | Managing user information on an e-commerce system |
US20060229944A1 (en) * | 2000-02-18 | 2006-10-12 | Walker Jay S | Method and apparatus for conducting or facilitating a promotion |
US7133846B1 (en) * | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management |
US7257581B1 (en) * | 2000-08-04 | 2007-08-14 | Guardian Networks, Llc | Storage, management and distribution of consumer information |
US7289971B1 (en) * | 1996-07-22 | 2007-10-30 | O'neil Kevin P | Personal information security and exchange tool |
US7343351B1 (en) * | 1999-08-31 | 2008-03-11 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions |
US20090125429A1 (en) * | 1997-08-13 | 2009-05-14 | Matsushita Electric Industrial Co., Ltd. | Mobile electronic commerce system |
US20090157531A1 (en) * | 1999-12-09 | 2009-06-18 | Bui Hong Q | Payment service capable of being invoked from merchant sites |
US7827115B2 (en) * | 2000-04-24 | 2010-11-02 | Visa International Service Association | Online payer authentication service |
Family Cites Families (113)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR1098155A (en) | 1954-01-09 | 1955-07-19 | S E T U D E | Process and devices for decanting liquids loaded with suspended particles |
NL7001713A (en) | 1970-02-06 | 1971-08-10 | Pielkenrood Vinitex Bv | |
US4067813A (en) | 1973-11-05 | 1978-01-10 | Pielkenrood-Vinitex B.V. | Compound separation device |
US4437988A (en) | 1981-08-03 | 1984-03-20 | William James | Plate separator construction and method |
US4759063A (en) | 1983-08-22 | 1988-07-19 | Chaum David L | Blind signature systems |
US4759064A (en) | 1985-10-07 | 1988-07-19 | Chaum David L | Blind unanticipated signature systems |
US4713753A (en) | 1985-02-21 | 1987-12-15 | Honeywell Inc. | Secure data processing system architecture with format control |
US4799156A (en) | 1986-10-01 | 1989-01-17 | Strategic Processing Corporation | Interactive market management system |
US4914698A (en) | 1988-03-16 | 1990-04-03 | David Chaum | One-show blind signature systems |
US4949380A (en) | 1988-10-20 | 1990-08-14 | David Chaum | Returned-value blind signature systems |
US4991210A (en) | 1989-05-04 | 1991-02-05 | David Chaum | Unpredictable blind signature systems |
US5487826A (en) | 1993-05-27 | 1996-01-30 | International Envelope Company, Inc. | Cardboard mailer packages |
US5794207A (en) | 1996-09-04 | 1998-08-11 | Walker Asset Management Limited Partnership | Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven conditional purchase offers |
AU691366B2 (en) | 1994-10-28 | 1998-05-14 | Surety.Com, Inc. | Digital document authentication system for providing a certificate which authenticates and uniquely identifies a document |
US6073241A (en) | 1996-08-29 | 2000-06-06 | C/Net, Inc. | Apparatus and method for tracking world wide web browser requests across distinct domains using persistent client-side state |
US5930479A (en) | 1996-10-21 | 1999-07-27 | At&T Corp | Communications addressing system |
US6061790A (en) | 1996-11-20 | 2000-05-09 | Starfish Software, Inc. | Network computer system with remote user data encipher methodology |
US5961593A (en) | 1997-01-22 | 1999-10-05 | Lucent Technologies, Inc. | System and method for providing anonymous personalized browsing by a proxy system in a network |
US5875296A (en) | 1997-01-28 | 1999-02-23 | International Business Machines Corporation | Distributed file system web server user authentication with cookies |
US5903721A (en) | 1997-03-13 | 1999-05-11 | cha|Technologies Services, Inc. | Method and system for secure online transaction processing |
US6999936B2 (en) | 1997-05-06 | 2006-02-14 | Sehr Richard P | Electronic ticketing system and methods utilizing multi-service visitor cards |
US7117358B2 (en) | 1997-07-24 | 2006-10-03 | Tumbleweed Communications Corp. | Method and system for filtering communication |
US6092196A (en) | 1997-11-25 | 2000-07-18 | Nortel Networks Limited | HTTP distributed remote user authentication system |
CA2245293C (en) | 1998-03-12 | 2003-01-21 | Lucent Technologies Inc. | System and method for providing anonymous remailing and filtering of electronic mail |
US6266692B1 (en) | 1999-01-04 | 2001-07-24 | International Business Machines Corporation | Method for blocking all unwanted e-mail (SPAM) using a header-based password |
US6353852B1 (en) | 1999-01-27 | 2002-03-05 | Adc Telecommunications, Inc. | Enhanced telephone service system with secure system and method for E-mail address registration |
US7333942B1 (en) * | 1999-03-26 | 2008-02-19 | D-Net Corporation | Networked international system for organizational electronic commerce |
AU4501600A (en) | 1999-04-30 | 2000-11-17 | X.Com Corporation | System and method for electronically exchanging value among distributed users |
US6421768B1 (en) | 1999-05-04 | 2002-07-16 | First Data Corporation | Method and system for authentication and single sign on using cryptographically assured cookies in a distributed computer environment |
US6957334B1 (en) | 1999-06-23 | 2005-10-18 | Mastercard International Incorporated | Method and system for secure guaranteed transactions over a computer network |
US6668322B1 (en) | 1999-08-05 | 2003-12-23 | Sun Microsystems, Inc. | Access management system and method employing secure credentials |
US6609198B1 (en) | 1999-08-05 | 2003-08-19 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
US7216292B1 (en) | 1999-09-01 | 2007-05-08 | Microsoft Corporation | System and method for populating forms with previously used data values |
US6438610B1 (en) | 1999-09-24 | 2002-08-20 | Hewlett-Packard Co. | System using buffers for decompressing compressed scanner image data received from a network peripheral device and transmitting to a client's web browser |
ATE345002T1 (en) | 1999-09-24 | 2006-11-15 | Citicorp Dev Ct Inc | METHOD AND APPARATUS FOR AUTHENTICATED ACCESS TO A MULTIPLE NETWORK OPERATORS THROUGH A SINGLE LOGIN |
US6381597B1 (en) | 1999-10-07 | 2002-04-30 | U-Know Software Corporation | Electronic shopping agent which is capable of operating with vendor sites which have disparate formats |
JP2001186122A (en) | 1999-12-22 | 2001-07-06 | Fuji Electric Co Ltd | Authentication system and authentication method |
US6629081B1 (en) | 1999-12-22 | 2003-09-30 | Accenture Llp | Account settlement and financing in an e-commerce environment |
EP1132797A3 (en) | 2000-03-08 | 2005-11-23 | Aurora Wireless Technologies, Ltd. | Method for securing user identification in on-line transaction systems |
US6907401B1 (en) | 2000-03-13 | 2005-06-14 | Verizon Corporate Services Group Inc. | Portal switch for electronic commerce |
CA2409413A1 (en) * | 2000-05-16 | 2001-11-22 | Blackbird Holdings, Inc. | Systems and methods for conducting derivative trades electronically |
US20030158960A1 (en) | 2000-05-22 | 2003-08-21 | Engberg Stephan J. | System and method for establishing a privacy communication path |
US20020016721A1 (en) | 2000-06-05 | 2002-02-07 | Steven Mason | System and method for automating record keeping |
BR0112382A (en) * | 2000-06-28 | 2005-04-12 | Patentek Inc | Method and system for the secure collection, storage and transmission of information |
US7134137B2 (en) | 2000-07-10 | 2006-11-07 | Oracle International Corporation | Providing data to applications from an access system |
US7194764B2 (en) | 2000-07-10 | 2007-03-20 | Oracle International Corporation | User authentication |
US7080077B2 (en) | 2000-07-10 | 2006-07-18 | Oracle International Corporation | Localized access |
US7124203B2 (en) | 2000-07-10 | 2006-10-17 | Oracle International Corporation | Selective cache flushing in identity and access management systems |
US8661539B2 (en) | 2000-07-10 | 2014-02-25 | Oracle International Corporation | Intrusion threat detection |
US9038170B2 (en) | 2000-07-10 | 2015-05-19 | Oracle International Corporation | Logging access system events |
US7249369B2 (en) | 2000-07-10 | 2007-07-24 | Oracle International Corporation | Post data processing |
US7464162B2 (en) | 2000-07-10 | 2008-12-09 | Oracle International Corporation | Systems and methods for testing whether access to a resource is authorized based on access information |
US8204999B2 (en) | 2000-07-10 | 2012-06-19 | Oracle International Corporation | Query string processing |
US7016877B1 (en) | 2000-08-04 | 2006-03-21 | Enfotrust Networks, Inc. | Consumer-controlled limited and constrained access to a centrally stored information account |
US7467141B1 (en) | 2000-08-04 | 2008-12-16 | Grdn. Net Solutions, Llc | Branding and revenue sharing models for facilitating storage, management and distribution of consumer information |
US8566248B1 (en) | 2000-08-04 | 2013-10-22 | Grdn. Net Solutions, Llc | Initiation of an information transaction over a network via a wireless device |
US9928508B2 (en) | 2000-08-04 | 2018-03-27 | Intellectual Ventures I Llc | Single sign-on for access to a central data repository |
US7016875B1 (en) | 2000-08-04 | 2006-03-21 | Enfotrust Networks, Inc. | Single sign-on for access to a central data repository |
US20050171811A1 (en) | 2000-09-26 | 2005-08-04 | Bottomline Technologies (De) Inc. | Electronic financial transaction system |
WO2002029671A1 (en) | 2000-10-02 | 2002-04-11 | Covisint Llc | Industry-wide business to business exchange |
US7035828B2 (en) | 2000-10-25 | 2006-04-25 | Topmoxie, Inc. | Method and system for modifying and transmitting data between a portable computer and a network |
US7487130B2 (en) | 2000-11-07 | 2009-02-03 | Grdn. Net Solutions, Llc | Consumer-controlled limited and constrained access to a centrally stored information account |
US7054906B2 (en) | 2000-12-29 | 2006-05-30 | Levosky Michael P | System and method for controlling and organizing Email |
US20020129111A1 (en) | 2001-01-15 | 2002-09-12 | Cooper Gerald M. | Filtering unsolicited email |
CA2437726A1 (en) | 2001-02-15 | 2002-08-22 | Suffix Mail Inc. | E-mail messaging system |
US7185364B2 (en) | 2001-03-21 | 2007-02-27 | Oracle International Corporation | Access system interface |
WO2002073926A1 (en) | 2001-03-09 | 2002-09-19 | Ascio Technologies, Inc. | System and a method for managing digital identities |
US6973481B2 (en) | 2001-03-23 | 2005-12-06 | Emailias Llc | System and method for creating and managing forwarding email address |
JP4089171B2 (en) | 2001-04-24 | 2008-05-28 | 株式会社日立製作所 | Computer system |
US20020178365A1 (en) | 2001-05-24 | 2002-11-28 | Shingo Yamaguchi | Method and system for controlling access to network resources based on connection security |
WO2002103499A2 (en) | 2001-06-15 | 2002-12-27 | Versada Networks, Inc. | System and method for specifying security, privacy, and access control to information used by others |
US7380271B2 (en) | 2001-07-12 | 2008-05-27 | International Business Machines Corporation | Grouped access control list actions |
US6605224B2 (en) | 2001-07-24 | 2003-08-12 | Highland Tank And Manufacturing Company | Coalescer apparatus in an oil/water separator |
US20030130960A1 (en) | 2001-11-28 | 2003-07-10 | Fraser John D. | Bridging service for security validation within enterprises |
US20030131232A1 (en) | 2001-11-28 | 2003-07-10 | Fraser John D. | Directory-based secure communities |
US7610390B2 (en) | 2001-12-04 | 2009-10-27 | Sun Microsystems, Inc. | Distributed network identity |
US7478418B2 (en) | 2001-12-12 | 2009-01-13 | Guardian Data Storage, Llc | Guaranteed delivery of changes to security policies in a distributed system |
FI114956B (en) | 2001-12-27 | 2005-01-31 | Nokia Corp | Method of using the service, system and terminal |
US7076558B1 (en) | 2002-02-27 | 2006-07-11 | Microsoft Corporation | User-centric consent management system and method |
IES20020190A2 (en) | 2002-03-13 | 2003-09-17 | Daon Ltd | a biometric authentication system and method |
JP3678417B2 (en) | 2002-04-26 | 2005-08-03 | 正幸 糸井 | Personal authentication method and system |
KR100460322B1 (en) | 2002-05-31 | 2004-12-08 | (주) 시큐컴 | System and Method for preventing spam mails |
JP4932154B2 (en) | 2002-06-06 | 2012-05-16 | ドルマーク アセッツ リミティド ライアビリティー カンパニー | Method and system for providing user authentication to a member site in an identity management network, method for authenticating a user at a home site belonging to the identity management network, computer readable medium, and system for hierarchical distributed identity management |
WO2003104947A2 (en) | 2002-06-06 | 2003-12-18 | Hardt Dick C | Distributed hierarchical identity management |
CA2458257A1 (en) | 2002-06-06 | 2003-09-10 | Sxip Networks Inc. | Distributed hierarchical identity management |
US6842449B2 (en) | 2002-07-09 | 2005-01-11 | Verisign, Inc. | Method and system for registering and automatically retrieving digital-certificates in voice over internet protocol (VOIP) communications |
US7356695B2 (en) | 2002-08-01 | 2008-04-08 | International Business Machines Corporation | Multi-level security systems |
EP1388986A1 (en) | 2002-08-06 | 2004-02-11 | Hewlett Packard Company, a Delaware Corporation | Process for protecting personal identification data in a network by associating substitute identifiers |
TW583559B (en) | 2002-09-11 | 2004-04-11 | Hon Hai Prec Ind Co Ltd | Authorization and security management system and method |
US8065717B2 (en) | 2002-11-27 | 2011-11-22 | Activcard | Automated security token administrative services |
US7207058B2 (en) | 2002-12-31 | 2007-04-17 | American Express Travel Related Services Company, Inc. | Method and system for transmitting authentication context information |
US7134015B2 (en) | 2003-01-16 | 2006-11-07 | International Business Machines Corporation | Security enhancements for pervasive devices |
FI115564B (en) | 2003-02-03 | 2005-05-31 | Nokia Corp | Method and system for performing testing of a device and device |
US7703128B2 (en) | 2003-02-13 | 2010-04-20 | Microsoft Corporation | Digital identity management |
US7219148B2 (en) | 2003-03-03 | 2007-05-15 | Microsoft Corporation | Feedback loop for spam prevention |
WO2004081756A2 (en) | 2003-03-12 | 2004-09-23 | Nationwide Mutual Insurance Co | Trust governance framework |
US7444668B2 (en) | 2003-05-29 | 2008-10-28 | Freescale Semiconductor, Inc. | Method and apparatus for determining access permission |
US7854009B2 (en) | 2003-06-12 | 2010-12-14 | International Business Machines Corporation | Method of securing access to IP LANs |
CA2447121C (en) | 2003-11-17 | 2007-05-22 | Dick C. Hardt | Pseudonymous email address manager |
US7783741B2 (en) | 2003-11-17 | 2010-08-24 | Hardt Dick C | Pseudonymous email address manager |
US7505597B2 (en) | 2004-03-17 | 2009-03-17 | Lockheed Martin Corporation | Multi-level security CDMA communications arrangement |
US7237010B2 (en) | 2004-03-18 | 2007-06-26 | International Business Machines Corporation | Method, system and computer program product for generating and processing a disposable email address |
US7475431B2 (en) | 2004-06-10 | 2009-01-06 | International Business Machines Corporation | Using security levels to improve permission checking performance and manageability |
CA2494225C (en) | 2004-06-16 | 2006-10-10 | Sxip Networks Inc. | Graduated authentication in an identity management system |
CA2468585C (en) | 2004-06-16 | 2006-10-17 | Sxip Networks Inc. | Auditable privacy policies in a distributed hierarchical identity management system |
US9245266B2 (en) | 2004-06-16 | 2016-01-26 | Callahan Cellular L.L.C. | Auditable privacy policies in a distributed hierarchical identity management system |
US7454623B2 (en) | 2004-06-16 | 2008-11-18 | Blame Canada Holdings Inc | Distributed hierarchical identity management system authentication mechanisms |
CA2468351C (en) | 2004-06-16 | 2006-10-31 | Sxip Networks Inc. | Distributed hierarchical identity management system authentication mechanisms |
US8504704B2 (en) | 2004-06-16 | 2013-08-06 | Dormarke Assets Limited Liability Company | Distributed contact information management |
US8527752B2 (en) | 2004-06-16 | 2013-09-03 | Dormarke Assets Limited Liability | Graduated authentication in an identity management system |
US7197539B1 (en) | 2004-11-01 | 2007-03-27 | Symantec Corporation | Automated disablement of disposable e-mail addresses based on user actions |
US7546349B1 (en) | 2004-11-01 | 2009-06-09 | Symantec Corporation | Automatic generation of disposable e-mail addresses |
US8635679B2 (en) | 2005-12-08 | 2014-01-21 | Webler Solutions, Llc | Networked identity framework |
-
2001
- 2001-11-20 US US09/988,811 patent/US8566248B1/en not_active Expired - Fee Related
-
2009
- 2009-05-04 US US12/434,803 patent/US20090210293A1/en not_active Abandoned
-
2015
- 2015-11-13 US US14/941,528 patent/US20160140582A1/en not_active Abandoned
Patent Citations (85)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4780821A (en) * | 1986-07-29 | 1988-10-25 | International Business Machines Corp. | Method for multiple programs management within a network having a server computer and a plurality of remote computers |
US5644723A (en) * | 1989-05-01 | 1997-07-01 | Credit Verification Corporation | Method and system for selective incentive point-of-sale marketing in response to customer shopping histories |
US20060106734A1 (en) * | 1994-11-28 | 2006-05-18 | Ned Hoffman | System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse |
US7133846B1 (en) * | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management |
US5677955A (en) * | 1995-04-07 | 1997-10-14 | Financial Services Technology Consortium | Electronic funds transfer instruments |
US5774551A (en) * | 1995-08-07 | 1998-06-30 | Sun Microsystems, Inc. | Pluggable account management interface with unified login and logout and multiple user authentication services |
US5737701A (en) * | 1995-10-03 | 1998-04-07 | At&T Corp. | Automatic authentication system |
US5911141A (en) * | 1995-11-07 | 1999-06-08 | International Business Machines Corporation | On-line hierarchical form records identification |
US5855007A (en) * | 1995-11-15 | 1998-12-29 | Jovicic; Neboisa | Electronic coupon communication system |
US5872850A (en) * | 1996-02-02 | 1999-02-16 | Microsoft Corporation | System for enabling information marketplace |
US5815665A (en) * | 1996-04-03 | 1998-09-29 | Microsoft Corporation | System and method for providing trusted brokering services over a distributed network |
US5983208A (en) * | 1996-06-17 | 1999-11-09 | Verifone, Inc. | System, method and article of manufacture for handling transaction results in a gateway payment architecture utilizing a multichannel, extensible, flexible architecture |
US6052710A (en) * | 1996-06-28 | 2000-04-18 | Microsoft Corporation | System and method for making function calls over a distributed network |
US6125352A (en) * | 1996-06-28 | 2000-09-26 | Microsoft Corporation | System and method for conducting commerce over a distributed network |
US7289971B1 (en) * | 1996-07-22 | 2007-10-30 | O'neil Kevin P | Personal information security and exchange tool |
US5794259A (en) * | 1996-07-25 | 1998-08-11 | Lextron Systems, Inc | Apparatus and methods to enhance web browsing on the internet |
US5953710A (en) * | 1996-10-09 | 1999-09-14 | Fleming; Stephen S. | Children's credit or debit card system |
US5995965A (en) * | 1996-11-18 | 1999-11-30 | Humetrix, Inc. | System and method for remotely accessing user data records |
US6005939A (en) * | 1996-12-06 | 1999-12-21 | International Business Machines Corporation | Method and apparatus for storing an internet user's identity and access rights to world wide web resources |
US6243688B1 (en) * | 1997-04-14 | 2001-06-05 | Dyan T. Kalina | Internet-based credit interchange system of converting purchase credit awards through credit exchange system for purchase of investment vehicle |
US6029141A (en) * | 1997-06-27 | 2000-02-22 | Amazon.Com, Inc. | Internet-based customer referral system |
US20090125429A1 (en) * | 1997-08-13 | 2009-05-14 | Matsushita Electric Industrial Co., Ltd. | Mobile electronic commerce system |
US6308203B1 (en) * | 1997-10-14 | 2001-10-23 | Sony Corporation | Information processing apparatus, information processing method, and transmitting medium |
US6651090B1 (en) * | 1997-10-14 | 2003-11-18 | Sony Corporation | Information processing apparatus, information processing method, and transmitting medium |
US6009410A (en) * | 1997-10-16 | 1999-12-28 | At&T Corporation | Method and system for presenting customized advertising to a user on the world wide web |
US6026166A (en) * | 1997-10-20 | 2000-02-15 | Cryptoworx Corporation | Digitally certifying a user identity and a computer system in combination |
US6865426B1 (en) * | 1997-10-28 | 2005-03-08 | Georgia Tech Research Corporation | Adaptive data security systems and methods |
US6714916B1 (en) * | 1997-11-02 | 2004-03-30 | Amazon.Com, Inc. | Crossing paths notification service |
US20010011250A1 (en) * | 1997-11-12 | 2001-08-02 | Cris T. Paltenghe | Distributed network based electronic wallet |
US6571279B1 (en) * | 1997-12-05 | 2003-05-27 | Pinpoint Incorporated | Location enhanced information delivery system |
US6233608B1 (en) * | 1997-12-09 | 2001-05-15 | Openwave Systems Inc. | Method and system for securely interacting with managed data from multiple devices |
US6012044A (en) * | 1997-12-10 | 2000-01-04 | Financial Engines, Inc. | User interface for a financial advisory system |
US6208659B1 (en) * | 1997-12-22 | 2001-03-27 | Nortel Networks Limited | Data processing system and method for providing personal information in a communication network |
US6289333B1 (en) * | 1998-01-16 | 2001-09-11 | Aspect Communications Corp. | Methods and apparatus enabling dynamic resource collaboration when collaboration session host is distinct from resource host |
US6385596B1 (en) * | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system |
US20010018675A1 (en) * | 1998-02-17 | 2001-08-30 | Blaze Matthew A. | Method and apparatus for compliance checking in a trust-management system |
US6199079B1 (en) * | 1998-03-09 | 2001-03-06 | Junglee Corporation | Method and system for automatically filling forms in an integrated network based transaction environment |
US6751735B1 (en) * | 1998-03-23 | 2004-06-15 | Novell, Inc. | Apparatus for control of cryptography implementations in third party applications |
US6154768A (en) * | 1998-03-30 | 2000-11-28 | International Business Machines Corporation | System and method for negotiating functions and features |
US6192380B1 (en) * | 1998-03-31 | 2001-02-20 | Intel Corporation | Automatic web based form fill-in |
US20020002684A1 (en) * | 1998-05-01 | 2002-01-03 | Barbara L. Fox | Intelligent trust management method and system |
US6247029B1 (en) * | 1998-05-01 | 2001-06-12 | International Business Machines Corporation | Web browser form enhancements |
US6321339B1 (en) * | 1998-05-21 | 2001-11-20 | Equifax Inc. | System and method for authentication of network users and issuing a digital certificate |
US6298347B1 (en) * | 1998-08-25 | 2001-10-02 | Numoda Corporation | System and method for remote data entry |
US6584448B1 (en) * | 1998-09-25 | 2003-06-24 | Catalina Marketing International, Inc. | Method of and system for distributing and redeeming electronic coupons |
US6253203B1 (en) * | 1998-10-02 | 2001-06-26 | Ncr Corporation | Privacy-enhanced database |
US6131096A (en) * | 1998-10-05 | 2000-10-10 | Visto Corporation | System and method for updating a remote database in a network |
US6285983B1 (en) * | 1998-10-21 | 2001-09-04 | Lend Lease Corporation Ltd. | Marketing systems and methods that preserve consumer privacy |
US6073106A (en) * | 1998-10-30 | 2000-06-06 | Nehdc, Inc. | Method of managing and controlling access to personal information |
US6845370B2 (en) * | 1998-11-12 | 2005-01-18 | Accenture Llp | Advanced information gathering for targeted activities |
US20020033528A1 (en) * | 1998-11-16 | 2002-03-21 | Nec Corporation | Multichip module and method for manufacturing |
US6327578B1 (en) * | 1998-12-29 | 2001-12-04 | International Business Machines Corporation | Four-party credit/debit payment protocol |
US6496855B1 (en) * | 1999-03-02 | 2002-12-17 | America Online, Inc. | Web site registration proxy system |
US6401085B1 (en) * | 1999-03-05 | 2002-06-04 | Accenture Llp | Mobile communication and computing system and method |
US6356905B1 (en) * | 1999-03-05 | 2002-03-12 | Accenture Llp | System, method and article of manufacture for mobile communication utilizing an interface support framework |
US6665704B1 (en) * | 1999-06-18 | 2003-12-16 | Sun Microsystems, Inc. | Bounding delays and reducing threading overheads in caching |
US7100195B1 (en) * | 1999-07-30 | 2006-08-29 | Accenture Llp | Managing user information on an e-commerce system |
US7343351B1 (en) * | 1999-08-31 | 2008-03-11 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions |
US20050010653A1 (en) * | 1999-09-03 | 2005-01-13 | Fastforward Networks, Inc. | Content distribution system for operation over an internetwork including content peering arrangements |
US20010039586A1 (en) * | 1999-12-06 | 2001-11-08 | Leonard Primak | System and method for dynamic content routing |
US20090157531A1 (en) * | 1999-12-09 | 2009-06-18 | Bui Hong Q | Payment service capable of being invoked from merchant sites |
US6571285B1 (en) * | 1999-12-23 | 2003-05-27 | Accenture Llp | Providing an integrated service assurance environment for a network |
US6606643B1 (en) * | 2000-01-04 | 2003-08-12 | International Business Machines Corporation | Method of automatically selecting a mirror server for web-based client-host interaction |
US20060229944A1 (en) * | 2000-02-18 | 2006-10-12 | Walker Jay S | Method and apparatus for conducting or facilitating a promotion |
US6879965B2 (en) * | 2000-03-01 | 2005-04-12 | Passgate Corporation | Method, system and computer readable medium for web site account and e-commerce management from a central location |
US20030079123A1 (en) * | 2000-03-08 | 2003-04-24 | Joan-Maria Mas Ribes | Mobile code and method for resource management for mobile code |
US20010047276A1 (en) * | 2000-03-27 | 2001-11-29 | Fritz Eisenhart | Business to business technology exchange and collaboration system and method |
US20020154157A1 (en) * | 2000-04-07 | 2002-10-24 | Sherr Scott Jeffrey | Website system and process for selection and delivery of electronic information on a network |
US7827115B2 (en) * | 2000-04-24 | 2010-11-02 | Visa International Service Association | Online payer authentication service |
US6944677B1 (en) * | 2000-05-09 | 2005-09-13 | Aspect Communications Corporation | Common user profile server and method |
US20020078233A1 (en) * | 2000-05-12 | 2002-06-20 | Alexandros Biliris | Method and apparatus for content distribution network brokering and peering |
US20020198818A1 (en) * | 2000-05-16 | 2002-12-26 | Pcorder.Com | Method and apparatus for efficiently generating electronic requests for quote |
US6725050B1 (en) * | 2000-05-25 | 2004-04-20 | Sprint Communications Company L.P. | Wireless communication system for an enterprise |
US7257581B1 (en) * | 2000-08-04 | 2007-08-14 | Guardian Networks, Llc | Storage, management and distribution of consumer information |
US20020029201A1 (en) * | 2000-09-05 | 2002-03-07 | Zeev Barzilai | Business privacy in the electronic marketplace |
US20020107972A1 (en) * | 2000-09-19 | 2002-08-08 | Keane Kerry C. | System and method for distributing media content |
US20020049912A1 (en) * | 2000-10-20 | 2002-04-25 | Shinsuke Honjo | Access control method |
US20020152179A1 (en) * | 2000-10-27 | 2002-10-17 | Achiezer Racov | Remote payment method and system |
US6491217B2 (en) * | 2001-03-31 | 2002-12-10 | Koninklijke Philips Electronics N.V. | Machine readable label reader system with versatile response selection |
US20030018587A1 (en) * | 2001-07-20 | 2003-01-23 | Althoff Oliver T. | Checkout system for on-line, card present equivalent interchanges |
US20030154306A1 (en) * | 2002-02-11 | 2003-08-14 | Perry Stephen Hastings | System and method to proxy inbound connections to privately addressed hosts |
US20030163733A1 (en) * | 2002-02-28 | 2003-08-28 | Ericsson Telefon Ab L M | System, method and apparatus for federated single sign-on services |
US20040225883A1 (en) * | 2003-05-07 | 2004-11-11 | Weller Michael K. | Method and apparatus providing multiple single levels of security for distributed processing in communication systems |
US20050015340A1 (en) * | 2003-06-27 | 2005-01-20 | Oracle International Corporation | Method and apparatus for supporting service enablers via service request handholding |
US20060031489A1 (en) * | 2004-04-21 | 2006-02-09 | Microsoft Corporation | Smart shares and transports |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9928508B2 (en) | 2000-08-04 | 2018-03-27 | Intellectual Ventures I Llc | Single sign-on for access to a central data repository |
US8566248B1 (en) | 2000-08-04 | 2013-10-22 | Grdn. Net Solutions, Llc | Initiation of an information transaction over a network via a wireless device |
US8260806B2 (en) | 2000-08-04 | 2012-09-04 | Grdn. Net Solutions, Llc | Storage, management and distribution of consumer information |
US20180121633A1 (en) * | 2000-11-10 | 2018-05-03 | Oath Inc. | Digital content distribution and subscription sysem |
US20030110374A1 (en) * | 2001-04-19 | 2003-06-12 | Masaaki Yamamoto | Terminal communication system |
US7962744B2 (en) * | 2001-04-19 | 2011-06-14 | Ntt Docomo, Inc. | Terminal communication system |
US8117649B2 (en) | 2002-06-06 | 2012-02-14 | Dormarke Assets Limited Liability Company | Distributed hierarchical identity management |
US8504704B2 (en) | 2004-06-16 | 2013-08-06 | Dormarke Assets Limited Liability Company | Distributed contact information management |
US9245266B2 (en) | 2004-06-16 | 2016-01-26 | Callahan Cellular L.L.C. | Auditable privacy policies in a distributed hierarchical identity management system |
US8527752B2 (en) | 2004-06-16 | 2013-09-03 | Dormarke Assets Limited Liability | Graduated authentication in an identity management system |
US10567391B2 (en) | 2004-06-16 | 2020-02-18 | Callahan Cellular L.L.C. | Graduated authentication in an identity management system |
US10904262B2 (en) | 2004-06-16 | 2021-01-26 | Callahan Cellular L.L.C. | Graduated authentication in an identity management system |
US8959652B2 (en) | 2004-06-16 | 2015-02-17 | Dormarke Assets Limited Liability Company | Graduated authentication in an identity management system |
US9398020B2 (en) | 2004-06-16 | 2016-07-19 | Callahan Cellular L.L.C. | Graduated authentication in an identity management system |
US11824869B2 (en) | 2004-06-16 | 2023-11-21 | Callahan Cellular L.L.C. | Graduated authentication in an identity management system |
US10298594B2 (en) | 2004-06-16 | 2019-05-21 | Callahan Cellular L.L.C. | Graduated authentication in an identity management system |
US20080109528A1 (en) * | 2004-12-06 | 2008-05-08 | Omnifone Limited | Method of Providing Content to a Wireless Computing Device |
US9407513B2 (en) | 2005-07-01 | 2016-08-02 | Verizon Patent And Licensing Inc. | System and method for web services management |
US8402525B1 (en) * | 2005-07-01 | 2013-03-19 | Verizon Services Corp. | Web services security system and method |
US8140414B2 (en) * | 2006-06-29 | 2012-03-20 | Carina Technology, Inc. | System and method for controlling a utility meter |
US20080086394A1 (en) * | 2006-06-29 | 2008-04-10 | Carina Technology, Inc. | System and method for controlling a utility meter |
US20130301626A1 (en) * | 2012-01-11 | 2013-11-14 | Saguna Networks Ltd. | Methods, circuits, devices, systems and associated computer executable code for facilitating access to a content source through a wireless mobile network |
US9642169B2 (en) * | 2012-01-11 | 2017-05-02 | Saguna Networks Ltd. | Methods, circuits, devices, systems and associated computer executable code for facilitating access to a content source through a wireless mobile network |
US9047456B2 (en) | 2012-03-20 | 2015-06-02 | Canon Information And Imaging Solutions, Inc. | System and method for controlling access to a resource |
US20150127771A1 (en) * | 2012-05-08 | 2015-05-07 | Nokia Solutions And Networks Oy | Method and Apparatus |
US9087105B2 (en) * | 2012-10-04 | 2015-07-21 | Adobe Systems Incorporated | Rule-based extraction, transformation, and loading of data between disparate data sources |
US10402420B2 (en) | 2012-10-04 | 2019-09-03 | Adobe Inc. | Rule-based extraction, transformation, and loading of data between disparate data sources |
US9454773B2 (en) | 2014-08-12 | 2016-09-27 | Danal Inc. | Aggregator system having a platform for engaging mobile device users |
US10154082B2 (en) | 2014-08-12 | 2018-12-11 | Danal Inc. | Providing customer information obtained from a carrier system to a client device |
US9461983B2 (en) | 2014-08-12 | 2016-10-04 | Danal Inc. | Multi-dimensional framework for defining criteria that indicate when authentication should be revoked |
WO2016025222A1 (en) * | 2014-08-12 | 2016-02-18 | Danal Inc. | An aggregator system having a platform for engaging mobile device users |
US10515090B2 (en) * | 2014-10-29 | 2019-12-24 | Jpmorgan Chase Bank, N.A. | Data extraction and transformation method and system |
US10277657B2 (en) * | 2015-04-22 | 2019-04-30 | Teruten, Inc. | Virtual browsing method using application and operation server |
US20160315994A1 (en) * | 2015-04-22 | 2016-10-27 | Teruten, Inc. | Virtual browsing method using application and operation server |
US20200082435A1 (en) * | 2018-09-06 | 2020-03-12 | Karleigh Jackson | Win draw system and method |
Also Published As
Publication number | Publication date |
---|---|
US8566248B1 (en) | 2013-10-22 |
US20160140582A1 (en) | 2016-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7016875B1 (en) | 2006-03-21 | Single sign-on for access to a central data repository |
US9928508B2 (en) | 2018-03-27 | Single sign-on for access to a central data repository |
US20160140582A1 (en) | 2016-05-19 | Information transactions over a network |
US7257581B1 (en) | 2007-08-14 | Storage, management and distribution of consumer information |
US7487130B2 (en) | 2009-02-03 | Consumer-controlled limited and constrained access to a centrally stored information account |
US7016877B1 (en) | 2006-03-21 | Consumer-controlled limited and constrained access to a centrally stored information account |
US7467141B1 (en) | 2008-12-16 | Branding and revenue sharing models for facilitating storage, management and distribution of consumer information |
TW552537B (en) | 2003-09-11 | System and method for integrating public and private data |
US8214886B2 (en) | 2012-07-03 | Method and apparatus for enabling a user to select an authentication method |
US7725385B2 (en) | 2010-05-25 | System and method for facilitating the handling of a dispute using disparate architectures |
CA2716420C (en) | 2015-02-17 | Third party information transfer |
US7565326B2 (en) | 2009-07-21 | Dialect independent multi-dimensional integrator using a normalized language platform and secure controlled access |
US20110270761A1 (en) | 2011-11-03 | Methods and apparatus for a financial document clearinghouse and secure delivery network |
US20040230536A1 (en) | 2004-11-18 | Method, system and computer readable medium for web site account and e-commerce management from a central location |
US20140041006A1 (en) | 2014-02-06 | Secure messaging center |
US20040128516A1 (en) | 2004-07-01 | Method and apparatus for verifying bearing instruments |
US20040143554A1 (en) | 2004-07-22 | Method and apparatus for generating a value bearing instrument |
WO2001073644A2 (en) | 2001-10-04 | Method and apparatus for generating a value bearing instrument |
WO2001074031A2 (en) | 2001-10-04 | Method and apparatus for verifying value bearing instruments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
2009-05-05 | AS | Assignment |
Owner name: GRDN. NET SOLUTIONS, LLC, DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GUARDIAN NETWORKS, LLC;REEL/FRAME:022641/0640 Effective date: 20070921 Owner name: GUARDIAN NETWORKS, LLC, GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ENFOTRUST NETWORKS, INC.;REEL/FRAME:022641/0618 Effective date: 20060918 Owner name: ENFOTRUST NETWORKS, INC., GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:STEELE, NICK;HAWKINS, STAN;MARANVILLE, JOE;AND OTHERS;REEL/FRAME:022641/0542;SIGNING DATES FROM 20020521 TO 20020522 |
2014-09-12 | AS | Assignment |
Owner name: INTELLECTUAL VENTURES I LLC, DELAWARE Free format text: MERGER;ASSIGNOR:GRDN. NET SOLUTIONS, LLC;REEL/FRAME:033727/0727 Effective date: 20140905 |
2016-04-18 | STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
2018-05-01 | AS | Assignment |
Owner name: CXT SYSTEMS, INC., NEW YORK Free format text: ASSIGNMENT OF RIGHTS IN CERTAIN ASSETS;ASSIGNOR:INTELLECTUAL VENTURES ASSETS 71 LLC;REEL/FRAME:046050/0980 Effective date: 20180126 |