Patent application number | Description | Published |
20090157527 | COMMUNICATION MECHANISMS FOR MULTI-MERCHANT PURCHASING ENVIRONMENT FOR DOWNLOADABLE PRODUCTS - A multi-merchant purchasing system is configured to identify downloadable products selected by a user for purchase. The identified downloadable products are offered by multiple merchants. The multi-merchant purchasing system enables the user to purchase all of the downloadable products in a single transaction. Merchant services are provided by the merchants to facilitate the purchasing of offered items. Interfaces are provided by the multi-merchant purchasing system and merchant services for the system and the services to interact. The interfaces provided by the merchant services enable the multi-merchant purchasing system to obtain information such as item metadata, purchase summary data, locations for downloading the purchased products, locations for obtaining support, and download verification data. The interfaces provided by the multi-merchant purchasing system enable the merchant services to perform tasks such as revoking licenses for products, complete purchases, and add licenses to a locker that includes purchased products. | 06-18-2009 |
20090171847 | MULTI-MERCHANT PURCHASING ENVIRONMENT FOR DOWNLOADABLE PRODUCTS - A multi-merchant purchasing system is configured to identify downloadable products selected by a user for purchase. The identified downloadable products are offered by multiple merchants. The multi-merchant purchasing system enables the user to purchase all of the downloadable products in a single transaction. Specifically, the multi-merchant purchasing system determines payment information associated with the user and, with minimum user-interaction, sends the payment information to applications associated with the merchants for processing. The multi-merchant purchasing system may also be configured to receive purchase information from the merchant applications and maintains the purchase information for the user in a locker. The multi-merchant purchasing system may further be configured to automatically download and install the purchased product onto the user's computing device through a software assistant. To ensure privacy and security, the multi-merchant purchasing system may include a credit card quarantine module to secure credit card data by encoding and multiple levels of encryptions. | 07-02-2009 |
20090320096 | MANAGING ACCESS TO A HEALTH-RECORD - A method to regulate access to a health record of an individual includes receiving a request from an application, the request identifying an item in the health record to which access is requested. The method further includes presenting the request to a marshal of the health record via a user interface and receiving a response from the marshal of the health record via the user interface, the response indicating whether access to the item is authorized or withheld. The method further includes granting the application access to the item if the response indicates that access to the item is authorized, and denying access to the item from the application if the response indicates that access to the item is withheld. | 12-24-2009 |
20090326982 | ESTABLISHING A PATIENT - PROVIDER CONSENT RELATIONSHIP FOR DATA SHARING - A shared secret may be shared between a patient and the patient's healthcare provider. The healthcare provider may submit the shared secret to the database system via a provider interface to generate a validation code. The validation code may be later submitted to the database system by the patient via a patient interface to cause the database system to prompt the patient to submit the shared secret. Upon submission of the shared secret to the database system, the patient may be prompted to approve or deny a request of the healthcare provider to access the electronic medical record of the patient. Access may be granted to the healthcare provider upon approval of the request by the patient. | 12-31-2009 |
20090327297 | ESTABLISHING PATIENT CONSENT ON BEHALF OF A THIRD PARTY - A database system, which stores electronic medical records, may assign a child-application-identification-code to a healthcare provider via a clinical system intermediary acting on behalf of the healthcare provider. The database system may associate the child-application-identification-code assigned to the healthcare provider with a privacy statement and terms of use associated with the clinical system. The privacy statement and terms of use may be presented to the patient when the patient is prompted by the database system to approve or deny a request by the healthcare provider to access the electronic medical record of the patient stored at the database system. | 12-31-2009 |
20110060660 | DIGITAL CONTENT PURCHASE MANAGEMENT - A multi-merchant purchasing system is configured to identify downloadable products selected by a user for purchase. The identified downloadable products are offered by multiple merchants. The multi-merchant purchasing system enables the user to purchase multiple downloadable products in a single transaction. Specifically, the multi-merchant purchasing system determines payment information associated with the user and, with little to no user-interaction, sends the payment information to applications associated with the merchants for processing. The multi-merchant purchasing system may also be configured to receive purchase information from the merchant applications and maintains the purchase information for the user in a locker. The multi-merchant purchasing system may further be configured to automatically download and install the purchased product onto the user's computing device through a software assistant. To promote privacy and security, the multi-merchant purchasing system may include a credit card quarantine module to secure credit card data. | 03-10-2011 |
20110246230 | Identity Matching And Information Linking - A connection component establishes an identity of a person for permitting access to information in a database. Responsive to establishing the identity of the person, the connection component may link an external account to the information in the database for providing a flow of information between the database and the external account. | 10-06-2011 |
20120036366 | SECURE AND VERIFIABLE DATA HANDLING - The described implementations relate to secure and verifiable data handling. One implementation can receive a request to upload information, wherein the information includes a referencing element and at least one blob of referenced data. This implementation can also receive a chunk of an individual blob. The chunk can include multiple blocks. Individual blocks can be hashed. Upon receipt of an indication that all chunks have been uploaded, this implementation can create an overall hash of the information from the block hashes rather than from the information. | 02-09-2012 |
20120060035 | Secure and Verifiable Data Handling - The described implementations relate to secure and verifiable data handling. One implementation can receive a request to add information from a drop-off site to a user account. The request can include a location element and a security element. This implementation can also obtain encrypted units of the referenced data from the drop-off site based upon the location element. This implementation can associate the information with the user account and store the security element. | 03-08-2012 |
20130006867 | SECURE PATIENT INFORMATION HANDLING - The description relates to secure patient information handling. One example can receive encrypted patient data from a first entity. The example can receive a request to view the encrypted patient data from a second entity. The request can include a conditional access code and the example can validate the conditional access code. In an instance where the conditional access code is valid, the example can retrieve an encryption key for the encrypted patient data. The example can decrypt at least a portion of the encrypted patient data to produce decrypted patient data. The example can provide at least some of the decrypted patient data to the second entity. | 01-03-2013 |
20140006051 | EMERGENCY MEDICAL PROFILES | 01-02-2014 |
Patent application number | Description | Published |
20080256616 | UNIFIED AUTHENTICATION FOR WEB METHOD PLATFORMS - An authentication mechanism is provided for a web method platform that allows homogeneous access for different types of clients according to a bootstrapping procedure utilized to establish the session. Different clients can be assigned different levels of trust based in part on the bootstrapping procedure and/or information provided during the procedure. The bootstrapping procedure can produce a token that is used by the clients in subsequent requests to provide previous authentication or state information to the platform. The token can comprise a shared secret used to ensure integrity of communications in some cases, and the token can be opaque to the client. Tokens can expire and require a client to re-bootstrap to provide higher levels of authentication protection, and tokens can be shared among a plurality of application servers to facilitate effective handling of requests in a farmed environment. | 10-16-2008 |
20080256643 | MULTIPLE ENTITY AUTHORIZATION MODEL - An authorization framework is provided that protects data records in a platform, such as a service-based platform, by requiring multiple level entities to be authorized with respect to the data records. For example, the data records can have an associated owner user that can grant access to other users with respect to the data. Additionally, however, the user can also grant access to certain applications that access the platform such that the data records can be initially closed for a user requiring the user to explicitly grant desired access to applications and/or users. In this regard, applications can be forbidden from accessing the data, even on behalf of the user, unless expressly authorized to do so by the user. Thus, the user can make informed decisions regarding who is to have access to its data. | 10-16-2008 |
20090083240 | AUTHORIZATION AGNOSTIC BASED MECHANISM - Systems and methods that provides for an authorization agnostic access in web service environments to privileged information. A query component can specify how a call is to be made to a data store and predefines the data that is retrievable in response to a query defined thereby (e.g., thru HTTPS, Java script, and the like). The query component can employ a plurality of filters that are implemented as part thereof, to customize retrieval for a predetermined portion of the data for a designated period, and encompass an end-to-end scenario from the browser up to the storage. | 03-26-2009 |
20090083241 | DATA PAGING WITH A STATELESS SERVICE - Systems and methods that facilitate data retrieval in a stateless environment by limiting amount of retrievable data associated with a single client request. A retrieval limitation component partially satisfies a query and retrieves an initial batch of information. Moreover, identifications can further be designated to retrieve additional information if so is required. Accordingly, an application requesting data thru a query can initially be supplied with a limited number of data, which subsequently can be followed by additional data items returned as unique identifiers. | 03-26-2009 |
20090254466 | SMART SECURE STORAGE - A healthcare smart card management system stores a large amount of healthcare information to overcome shortcomings of separate and largely paper medical and insurance files. Embedded security technology supports partial or separated identity proofing as well as hardware time limited storage. Dynamic contextual privacy consent enhances user, healthcare provider, and insurer privacy and proprietary information to encourage and enable universal adoption. Data is structured in self-executing (“print to device”) for legacy systems as well as in rolled-access format and archival format to balance usage and data integrity purposes. A plurality of network interfaces are incorporated as well as financial transaction codes. Card integrity is enhanced by remote usage oversight, self-destruct monitoring (e.g., time, location, hacking, malfunction, etc.), and integral write-only audit logs. Levering excess storage capacity, a user can store related healthcare information such as exercise regimen, diet journal, emergency contact information, urgent medical conditions for first providers, etc. | 10-08-2009 |
20110173168 | DATA VERSIONING THROUGH DATA TRANSFORMATIONS - In response to receiving a request for data stored according to a first version of a data type, a second version of the data type supported by the requester is determined, and the requested data is transformed from the first version to the second version to provide access to the data. | 07-14-2011 |
20130304759 | DATA PAGING WITH A STATELESS SERVICE - Systems and methods that facilitate data retrieval in a stateless environment by limiting amount of retrievable data associated with a single client request. A retrieval limitation component partially satisfies a query and retrieves an initial batch of information. Moreover, identifications can further be designated to retrieve additional information if so is required. Accordingly, an application requesting data thru a query can initially be supplied with a limited number of data, which subsequently can be followed by additional data items returned as unique identifiers. | 11-14-2013 |