摘要:
A system and method for providing a Proxied Contact Management System (PCMS) so that individual owners of personal contact data may control and manage the access and dissemination of their personal data and also control who may contact them. The owner of personal contact data may securely register the data with a secured information vault of the PCMS and specify which other parties may contact them. In this way, duplication of the personal data is avoided, but at the same time is always current. In use, a second party's device, such as a telephone or a PDA may request that the PCMS, under public key infrastructure (PKI) control, establish a connection with the first party. Once verified, the PCMS may establish a proxy connection between the first and second parties according to the permitted mode of communication defined by criteria established by the first party and managed by the PCMS. In this way, personal contact information, such as a telephone number, is kept secure and private and not provided to the second party.
摘要:
A system and method for exposing internal search indices to Internet search engines. The internal search indices are exposed to external search engines in such a way that the data may be segregated into at least two types including one layer of search data specifically for the search engines, and another for potential users of the application. This significantly improves the probability of discovery by search engines and also provides for presentation of discovered content to users in a manner consistent with the content itself, or consistent with the intended controls or presentations established by the content's owner. The system and method also includes one or more components that reproduce information about IP in a format that search engines can recognize and locate. The component also forwards users coming through the search engines to the actual IP graphical user interface (GUI) instead of the files that the search engine discovered. This allows control over the information that search engines see/view, while ensuring that a user's interface to the system stays constant.
摘要:
A system and method is provided for an on-demand advertising information vault so that advertisers may establish accounts for distributing advertisements on-line to potential subscribers. The on-demand information vault also provides for consumers to subscribe to advertisements from advertisers based on the consumer's preferences of categories of products or services. An advertiser may also establish rewards for viewing their advertisements for inducing consumers to subscribe to their advertising service. In this way, a consumer may agree to receive only certain types of advertisements and receive remuneration for viewing the advertisements. The vault mechanisms may also provide for protecting the identities of the consumer and advertiser and avoids misusing personal data by others by employing security measures.
摘要:
A system and method for providing an information vault so that individual owners of personal data may control and manage the access and dissemination of the personal data and provides for the owner of the personal data to receive compensation for the use of the personal data, thus, in effect, the personal data becomes a valuable commodity analogous to money. A business model is provided that allows competitive, unbiased trusted third parties whose business is protecting the information analogous to how a commercial bank protects money. Centralized protected storage of personal data is provided, thereby minimizing the number of copies that may be in existence. Second party access to the centralized storage of personal data may be made on-demand, as required for commerce, with a provision for assessing fees for accesses.
摘要:
Disclosed are a method of and system for assuring a person's identity. A first party registers with an identity service and gives that service a first set of answers to a set of questions and additional data; the identity service gives the first party identification information; and the first party, through interacting with the identity service, establishes its identity with a second party. To do this, the first party gives the second party the identification information and a second set of answers to the set of questions. The second party sends the identification information and the second set of answers to the identity service. The service analyzes the identification information and the first and second sets of answers to determine an identification quality rating for the first party, and sends that rating to the second party.
摘要:
A system and method for providing a secured information vault so that individual owners of personal data may control and manage the access and dissemination of the personal data and provides for the owner of the personal data to receive compensation for the use of the personal data, thus, in effect, the personal data becomes a valuable commodity analogous to money. Centralized protected storage of personal data is provided, which minimizes the number of copies that may be in existence. The personal data may be converted from one format to another by subscribing to format conversion services provide by the vault. The vault regularly updates stored personal data per the subscribed services so that the personal data is available in the latest data formats used by various industries. A fee may be charged for format conversions.
摘要:
A system and method for providing a Contact Management System (CMS) so that individual owners of personal contact data may control and manage the access and dissemination of the personal data. The owner of personal contact data may securely register the data with secured information vault of the CMS and specify which other parties may have access to the personal data. In this way, duplication of the personal data is avoided, but at the same time is always current. In use, a second party's device, such as a telephone or a PDA may access the CMS database and under public key infrastructure (PKI) controls identify themselves so that access to the owner's personal data may be verified. Once verified, the telephone number or other data may be returned to the device where a call may be automatically placed or otherwise used.
摘要:
Disclosed are a method and a system for the secure delivery of requested, valuable and/or time sensitive packages by authorized delivery agencies, without requiring that the recipient be present. Generally, in accordance with the present invention, a package is delivered to a specially designed receptacle such as a bin or a specially designed mailbox. The receptacle accepts the package if it is an expected package delivered by the expected delivery agency. Two specific implementations of the present invention are disclosed herein. The first has minimal impact on the order and delivery infrastructure existing in the world today. The second implementation is a more integrated approach, but requires that sales and delivery entities implement the interfaces to the secure package delivery bin solution.
摘要:
Digital data can be escrowed by receiving escrow parameters including a condition(s) for releasing the escrowed data, and an escrow recipient. An escrow contract is then created based upon the specified escrow parameters. The escrowing further includes storing the digital data in a secure information vault, and storing the escrow contract, along with a pointer to the stored data, in a database. When the condition has been satisfied, the data is released to the escrow recipient. The condition(s) for release can be a payment sum, a date, an indication from a depositor, a trustee or a vault administrator, and/or fulfillment of another escrow contract.
摘要:
A system and method for providing an intellectual property marketplace (IM) using a secured information vault so that individual owners of intellectual property (IP) may control and manage the access and dissemination of the IP. Producers of the IP may also receive compensation for transactions in the marketplace. Multiple services for adding IP such as books, movies, video, papers, research, music, inventions, or the like, to the IM include controlling authorized access to the IP and generation of advertising based on types of IP in order to solicit potential consumers. Transactions may be securely transacted using public keying infrastructure (PKI). Consumers subscribing to the IM may also be automatically notified when IP is added to the IM based on predetermined preferences established by the consumer.