主权项 |
1. A computer-implemented method for providing access to data of a first party, comprising:
providing a computer processor at a data custodian, the computer processor having a computer readable storage medium, the computer readable storage medium comprising instructions stored therein for executing on said processor, the instructions when read and executed, for: receiving information from a first party device for identifying the first party; authenticating the first party using the received information for identifying the first party; generating, upon receipt of a request from the first party device, a first read-only personal identification number (PIN) using a random or pseudo-random generator; associating the first read-only PIN with a second party's limited access rights for the data of the first party, wherein the second party's limited access rights are based on second party data; providing the first read-only PIN to the second party, wherein the first party, the data custodian, and the second party are different parties; storing the first read-only PIN with the second party's limited access rights in a computer database; receiving the first read-only PIN from a device associated with the second party; authenticating the received first read-only PIN by comparing the first read-only PIN received from the second party device with the stored first read-only PIN; and if the received first read-only PIN is authenticated, the data custodian providing the second party device with the limited access to the data of the first party as defined in the stored second party's limited access rights; receiving a selection from the first party device of a third party for receiving the first read-only PIN; associating the first read-only PIN with information for identifying the selected third party and with the third party's limited access rights for the data of the first party, wherein the third party's limited access rights are based on third party data, and wherein the third party's limited access rights are different than the second party's limited access rights; storing the first read-only PIN with the information for identifying the selected third party and with the third party's limited access rights in the computer database; receiving at least a portion of the information for identifying the selected third party; authenticating the selected third party using the received at least a portion of the information for identifying the selected third party and the stored information for identifying the selected third party; if the selected third party is authenticated, receiving the first read-only PIN from a device associated with the authenticated third party; authenticating the received first read-only PIN by comparing the first read-only PIN received from the third party device with the stored first read-only PIN; and if the first read-only PIN is authenticated, the data custodian providing the authenticated third party device with the limited access to the data of the first party as defined in the stored third party's limited access rights. |