Method and device for rule notification

FIELD: method and system for data exchange for facilitating upholding of laws and standards on information transfers and confidentiality of individuals.

SUBSTANCE: method includes stages: transferring from system to user computer a notification, that object confirmed agreement to sanctioned confidentiality and data protection rules; receipt by system of confirmation of individual of receipt of object by server or confirmation, that object will receive and use personal data in accordance to laws active in the country where individual or object is located; transferring by system to server of data object about agreement of individual to aforementioned receipt; receipt of data object from server, containing personal data of individual; periodical check of agreement of object.

EFFECT: improved reliability of information exchanges.

2 cl, 15 dwg

 

The technical field

The present invention is directed to the communication or transmission of data through a network and, more specifically, to communicate or transfer data on the basis of the Internet between companies and consumers in different regions or countries.

Prior art

In the past few years, consumers, employers, the media and officials - representatives of governments began to pay more attention to issues such as commercial use, collect and distribute personal information private persons In the United States Federal trade Commission (FTC) has taken the lead on this issue in 1997, when she began hearing about how "search" industry used personal information. These hearings focused on the main media companies in the United States (Lexis-Nexis, Trans Union, Equifax, Acxiom and CDB Infotek) and other credit Bureau and information companies. In the result of the hearing, the FTC persuaded information company that they must establish a self-regulating procedure. These basic information company formed IRSG (a service Group reference about individuals - GSOL)that supports a Web site http://www.irsg.org.

After attempts IRSG was the formation of the Online Privacy Alliance (Operative Alliance, ensuring the jalneti) (http://www.privacvalliance.org), Trust-e (http://www.truste.org), Better Business Bureau Online Bureau of effective business) (http://www.bbbonlme.org) and other similar organizations. They were all based commercial firms as an attempt to reflect the new privacy laws. All of them are to some extent governed by the same commercial company, which was supposed to control. And all they wanted to use a passive approach to the regulation of privacy on the Internet.

Most of these organizations appoint a nominal fee for membership. Most of them have online questionnaires, which they offer to fill commercial firms. However, these organizations do not support any continuous, regular supervision over commercial firms that they must control. And most importantly, they establish minimum standards for the protection of privacy in comparison to the standards established by 40 of the most developed countries, including most members of the organization for economic cooperation and development (OECD) and European Union (EU).

The European Union consists of 15 member-countries (there are 8 countries pending EU membership), including those countries that constitute the greater part of Western Europe. The EU currently has approximately 365 million permanent residents. There OK the lo 40 countries, taking privacy laws that are designed to meet EU standards. This means that there are about one billion people in countries that adopt privacy laws in the EU.

Privacy laws of the EU based on the Directive on data privacy (valid from October 1998). According to the EU Directive on data privacy for a country that does not provide "adequate protection" in order to guarantee the privacy of its citizens, can be marked all the data flows from the EU. For example, it is believed that the United States does not provide adequate protection. Despite the fact that some procedures are adopted, the American company and/or the Internet will not be able to process any personal data on individuals who are permanent residents of the European Union or any of the other countries that have adopted the same kind of procedures as the EU. The Internet company in the USA, for example, could not obtain personal information from the EU citizen to send goods to this consumer in the EU. An American Corporation with its main administration in the United States could not send personal information in the United States for decision making about staffing, etc.

The possibility of reducing the data flow between the US and Europe who can bring a loss of about $ 1 trillion per year in the provision of information and services between the United States and Europe. In order to avoid such losses, the U.S. and EU signed an agreement with Save the Harbor (the" safe Harbor"), which allows U.S. companies to certify that they will comply with the EU Directive on data privacy without mandatory registration and enforcement of bureaucratic procedures established by the EU Directive.

The U.S. and EU notified agreement "Quiet Harbor" 15 December 1999. The program "safe Haven" is not for American companies to evade the Directives of the EU data privacy, rather it provides for US a way to avoid agreeing with the bureaucratic procedures required by the Directive. In short, the American company will be able to certify that they will comply with the requirements of the data privacy Directive. It can still be challenged later, but self-certification means the presumption of conformity of the company's U.S. requirements.

Principles of data privacy Directive contains a requirement that personal data must be processed fairly and lawfully. This requirement has several components. The most important part for the present purpose is that the individual must give explicit consent to the processing of personal information of individuals. "Consent" is defined as "... n the which voluntarily given specific and informed indication of his desire, with the help of which the data subject expresses his agreement to the processing of data concerning him / her". Another important requirement is that "personal data should not be transferred to a country or territory outside the European economic area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data".

The Directive establishes a series of rights for individuals with respect to personal data about them stored other. Briefly these rights include the following: (1) the right of access to data; (2) the right to prevent processing that is likely to cause damage and distress; (3) the right to prevent processing for direct marketing; (4) the right to know certain information about automated decision making; (5) the right to take action for compensation of damages; and (6) the right to take action for rectification, blocking, Erasure and destruction of inaccurate data.

Most programs authorization privacy funded and run by companies that are subject to supervision. This casts doubt on the reliability and impartiality of such programs. Actually, in two widely publicized violations of the confidentiality of their companies-participants of one of the institution refused to intervene because of the relationship, companies-participants had with this organization. The recent joint project of the Office of information and authorized the Commission on privacy Ontario and authorized the Federal Commission for the privacy of Australia noted numerous inconsistencies of modern certification programs.

The invention

The preferred implementation of the present invention provides a method of facilitating compliance with laws and regulations on data protection and privacy-related rights to privacy for the individual persons. the Method comprises the following steps: (1) informing individuals involved in the potential disclosure of his/her personal data for some object that this object has certified its compliance with authorized action on privacy and data protection that are consistent with relevant laws and regulations on data protection and privacy, covering the use of personal data at least in the country of residence of the individual person or object referred to; (2) obtaining consent of the individual to accept or confirm that the object will accept and use the personal data of the person in accordance with the rules or with the relevant Zack the us and the data protection regulations and privacy covering the use of personal data at least in the host country the person or object referred to; (3) transferring the data object that indicates that the person is informed of the action on the confidentiality of the above-mentioned object and in accordance with the reception of this object (or confirmed the reception of the object) and use of personal data of a person in accordance with the rules or with the relevant laws and regulations on data protection and privacy, covering the use of personal data at least in the country of residence of the person or object referred to; (4) receive from data object containing personal data, adopted by the object of said person; (5) saving mentioned personal data received from the object; and (6) periodically check whether the object of the rules or applicable laws and regulations on data protection and privacy, covering the use of personal data at least in the country of residence of the person or object referred to. The method also preferably includes the step of informing the defendants that the object is protected by insurance or an equivalent tool to protect against risk, to protect against the risk of loss or damage referred to a person arising from non-the safe use or loss of personal data of the person referred to by the object.

Preferably, the data indicate that the person has agreed to receive the object (or confirmed the reception of the object) and use of personal data entity contains data that uniquely identifies the details relating to the consent or confirmation of a person (for example, IP address of the user, identification language identification country, period, end) and compressed using a hash function.

When the object passes personal data, adopted by the object from the named person back to the operator of the system implementing the preferred method, these transmitted data preferably includes data that is transferred to the object by the operator of the system that uniquely identifies the details relating to the agreement or (confirmation) of the face. The preferred method can be performed with a variety of objects and persons in one country or set of objects and persons in many countries.

The preferred implementation of the present invention also provides a system that includes a Web application server Internet on the system Web site, which receives redirected URL (universal resource locator) from the established Web site of the party, and displays the notification rules via the Internet to the consumer, which is forwarded to the system Web-site after accessing countries is itzá joining the party. Presents the notification rules, preferably associated with mappings consisting of privacy laws and insurance policies that apply in the country of residence of the consumer, and with the agreement submitted by the member, agree to protect personal consumer information in accordance with privacy laws of the country of residence of the consumer. In an alternative embodiment, the agreement provided by the participant, agree to protect personal information of the consumer, is in accordance with the privacy laws of the country of residence of the participant.

The consumer reads the agreement and agrees or does not agree to provide your personal information. In the present description, the "agreement" may also contain confirmation that the participant will receive consumer information. In this description of the concept of "agree" or "accept" should be understood as covering the case when the concept of "confirm" is more accurate. If the consumer agrees, then he clicks the "agree" button (or otherwise indicates acceptance (or confirmation), as is known in the art); if the consumer does not agree, he clicks the button "cancel" (or otherwise indicates a desire to reject the agreement). The results return the SJ from the system Web site to the Web site of the participant in the form hash code which preferably contains data indicating the acceptance or rejection of the user agreement, as well as information such as label, date/time and IP address of the consumer. If the user clicked the "agree"button, the Web-site participant will submit a form requesting personal information. When the consumer submits this completed form to the Web site of the party, one copy of this information is sent to the system Web site, and another copy is sent to the database principal for further processing. The hash code is sent back to the system Web-site for future use in connection with the audit procedures or resolution of the dispute.

Privacy notice preferably based on audits performed by independent organizations (such as PriceWaterhouseCoopers), which is approved by the operator in the preferred embodiment of the system. Independent organizations certify the system operator that the approved privacy standards are met. Organizations provide the system operator with information sufficient to determine how to collect and use personal information. However, in an alternative implementation of the privacy notice based solely or largely on information provided by the participant.

Preferably, the system operator provides n is dependent organization template to provide the system operator with information designed for use in privacy notices. Once the template is completed, the system is notified about the privacy of individual consumers. The privacy notice is submitted for the first time, when a consumer asks about disclosure of personal information in the Web site of the party (at this stage no personal information is collected in the Web-site of the participant). When the consumer gets the URL for the website that you don't usually collect personal information such preferred variant of the system is to this page to the consumer, which was forwarded to the Web site preference system. The page includes a privacy notice and information about how the system works.

The servers used in the preferred embodiment of the system, keep track of revisions for each company, showing what privacy notice was presented and what information was collected. The database tracks how long personal information will be maintained by each company. The operator preferred variant of the system notifies the company and the consumer, when this time period ends, and requests from the company confirming that the personal information is either removed or treated in the accordance with the desires of the individual consumer. Trace audit can be used in the event of a dispute between the participating companies and consumers.

An important distinguishing feature of the preferred alternative implementation of the present invention from other systems is providing the insurance. Participating consumer preferably serves the insurance policy (for example, 100000 dollars), which can be used in case of actual damage incurred by the customer due to misuse or loss of personal information of consumers participating company. The policy preferably allows the consumer to bring an action and recover damages from the participating company regardless of the location of such company.

The insurance program is designed to ensure that participating company will work with the insurance company to resolve disputes. If disputes are not resolved and if the claims paid, then the company will have to reimburse the insurance company for intentional violation of privacy.

The preferred system includes a feature that regularly verifies participating companies to ensure that they are consistent with the established rules of confidentiality. Check preferably supported random inspections for implementation through the diversified firms. For companies that violate their own privacy policies and/or are unable to correct their shortcomings, can be cancelled notification rules. If they use the notification rules, the violation of the rules of the system, apply enforcement action against the company. Relevant regulatory authorities can be notified of the violations and may use the information track revisions in order to maintain appropriate action against the offender (see. figure 5).

Therefore, the preferred implementation provides both parties in an electronic commercial transaction cash justifications for privacy. Consumers have independent confirmation that the company with which they carry out the transaction is legitimate and will use personal information appropriately. If there are violations, the consumer may apply for an insurance policy. Participating companies have consumers, trusting them to use the information in a suitable way, and may engage in commercial activities within the European Union and in other countries.

Brief description of drawings

Figa depicts a system diagram depicting the main components of the hardware system, corresponding to the preferred option performed the I of the present invention.

FIGU is a block diagram illustrating stages of a method according to a preferred variant implementation of the present invention.

Figure 2 - preferred option Web page notification rules.

Figure 3 - diagram of the process for the preferred option implementation.

Figure 4 - application diagram for the preferred option implementation.

5 is a diagram of commercial activity for the preferred option implementation.

6 is a structural diagram of the preferred option implementation.

Figa, figv and figs - class diagram design for the preferred option implementation.

Figa and FIGU - chart database design for the preferred option implementation.

A detailed description of the preferred options implementation

The preferred implementation of the present invention includes a computer system that has at least the following components (SMPhU): system server 10 is connected with the system database 15. The system server 10 is also connected to computer network 20 and through a computer network 20 is connected to the server 25 of the participant, the server 25 participant is connected to the database 30 of the participant. The server 25 participant is also connected through a computer network with a personal computer (PC) 40 consumer. In a preferred is ariante implementation of the network 25 and 35 are in fact one and the same network Internet.

The preferred implementation of the present invention further comprises a Web application server 10 Internet system Web site, which receives redirected URL (universal resource locator) of the server that you installed Web site 25 participant and displays the notification rules via the Internet 35 to the consumer through the consumer PC 40, which is forwarded to the system Web site. Presents the notification rules preferably associated with mappings consisting of privacy laws and insurance policies that apply in the country of residence of the consumer, and with the agreement submitted by the participant, agree to protect personal consumer information in accordance with privacy laws of the country of residence of the consumer. The consumer reads the agreement and agrees or does not agree to provide your personal information (or confirms that the participant will receive his / her personal information; for clarity of explanation in the following description does not focus on this, as specialists in the art it is clear where the term "confirm" can be used as an alternative to the terms "accept" or "agree"). If the consumer agrees, then he clicks the "agree" button (or otherwise shows with the consent, as is known in the art); if the consumer does not agree, he clicks the button "cancel". The results are returned from the system server 10 Web site in the server 25 Web site of the participant in the form of a hash code. If the user clicked the "agree"button, the Web server 25 participant submits a form requesting personal information. When the consumer submits this completed form to the Web server 25 of the participant, one copy of the information sent in system Web server 10, and another copy is sent to the database 30 of the participant for additional processing. The hash code is sent back to the system Web server 10 and database 15 for further tracking.

The hash code is a composite key that system Web server uses to keep track of what information was presented and agreed. This switch preferably contains at least the following information: (1) data of the participant; (2) the date and time; (3) a reference to the notification rules; and (4) the IP address of the user.

Figv illustrates the steps of a preferred variant of the method corresponding to the present invention. At step 105, the user accesses the page, join the party (Web site, which allows consumers to register or otherwise use the services of the participant). At step 115, the consumer Perea is RESEDA in the website and the server 10 of the preferred option system. Web server 25 participant sends the ID of the participant and the IP address of the user in the system, the Web server 10 (see scheme 3, step (a)).

At step 120 the user is transmitted to the agreement notification rules, which is specific to the country of residence of the participant and the consumer (as defined using the URL of the consumer). Agreement notification rules preferably contains information concerning the rules adopted by the party in relation to the collection and use of personally identifiable information (PII). In a preferred embodiment, the consumer is first submitted page summary of the privacy rule (smscr, 5), which summarizes the terms of the agreement. The user can then access additional details or to complete the work with this privacy policy, by clicking the relevant links on the page of the summary of the privacy policy.

If the consumer accepts the terms of the agreement, the user preferably clicks the "agree" button (or otherwise indicates consent (or confirmation)and if the customer does not accept the terms of the agreement, the consumer clicks the button "cancel" (or otherwise indicates a desire to reject the agreement). At step 125, the system checks indicated whether the consumer acceptance or rejection of the agreement is. If the consumer has indicated a rejection of the agreement, then at step 130, the system creates a hash code of "no" (the hash code, which specifies that the consumer has rejected the agreement). If the consumer stated the adoption agreement, then at step 135, the system creates a hash code "Yes" (the hash code, which specifies that the consumer has accepted (or confirmed) the agreement). Each hash code also contains other data, discussed below. Stage (b) figure 3.

If the consumer has indicated acceptance and on stage 135 generated hash code "Yes", or the consumer stated the deviation and on the stage 130 generated hash code "no", then at step 140 the user is redirected to the Web site of the party, and the hash code created in step 130 or 135 is sent to the Web site of the participant.

At step 145 Web-site participant checks whether the passed hash "Yes" from the system Web site. If Yes, then at step 165 Web-site participant is displayed in the form that requests personal information of the consumer, and the consumer approves the requested information. At step 170, the Web site of the participant accepts and stores information of the consumer (see steps (C) and (f) in figure 3) and sends an encrypted copy of the information user in the system Web-site together with the received hash code "Yes" (see step (d) in figure 3). This information is stored in the data memory of the user system (see step (e) in figure 3).

If at step 145 the Web site of the consumer determines that x is W-code "Yes" was not accepted, at step 150, the Web site user checks accepted if the hash code no. If the hash code of "no" was adopted, then at step 155 Web-site participant displays a page indicating to the user that permission to join cannot be given. If at step 150 Web-site participant does not define what was the resulting hash code is "no", the user is redirected to the page of the attachment.

The preferred system of the Web server 10 Web site is the Web server of the institutional class institutional database class in order to support Web application (for example, Internet information server (IS) company Microsoft, based on Windows NT server). The server preferably has the same dual interface configured in a cluster with load balancing. This ensures redundancy to support participants and consumers.

When the consumer returned to the system Web server 10, the data stored in the database 15. The hash code, name index database 25. The preferred database is Oracle 81 or its functional equivalents. Oracle is a recognized leader in relational database systems and has specific decisions about database applications Internet. The database 25 preferably has at least the following six tables:

(1) Detailed data the principal this table contains information of the participant. It is used to track detailed participant information and billing information.

(2) Global privacy laws - this table contains the privacy laws that have been indexed by the country in which they are applied. The table apply whenever a notification is made about the rules.

(3) Global insurance rules - this table contains insurance rules, which are agreed with each phase.

(4) Global IP register - this table is used to convert IP addresses of the consumer to the location. This is useful when the system is initially notified about the rules.

(5) activity Log - this table contains all event activities that occur in the application on the Web-site system.

(6) Information privacy consumer - this table contains all customer information, which is transmitted from the Web sites of the participant.

(7) Summary of the rules of confidentiality of the participant.

The preferred hardware system contains: (1) dual Web servers; (2) the database server; and (3) the tape drive for archiving. The preferred software includes: (1) Oracle 81; and (2) the application Web server.

The preferred option for the implementation of the population of the present invention contains an application GPNA (notification global rules) for informing the consumer, that participants adhere to common privacy laws of the country, protecting the personal information of the consumer. The preferred system notification rules: (1) notifies the rules for the consumer on the many languages supported by the organization of the participant; (2) supported by insurance; (3) complies with the privacy laws of the country that are supported by strict audit checks and control leading auditors; (4) provides for advance notice to participants, allowing them to remove personal information of consumers of their data memory after the expiration date; (5) requests the consent of the consumer, each time the relevant decision; and (6) provides functionality that allows the user to apply and provide treatment Agency research third party. Smfh.

The participant must make minimal changes to integrate system app to a Web-site participant. Changes mainly include (1) forwarded the URL of the page the customer connection site of the participant and (2) an HTTP request to send duplicate forms with personal information Web-site participant. The server 25 site participant must make a hash code, which section is asaeda from the system Web server 10, and pass this hash back into the system, the Web server 10 from the personal information that was collected from the consumer.

Below is a list of functional elements contained in the software of the preferred variants of the system:

(1) an external interface that allows the system to remember and maintain the participant's information and includes the following functionality: (A) add a data member, preferably comprises the following elements:

NameCountry default
OrganizationThe default language
AddressThe default URL
CityA pool of IP addresses
StateThreshold volume
CountryThe period of revision
PostcodeDate of access
Contact nameCurrent date
E-mail addressEnd date
PhoneStatus

(the"threshold amount" is the expected number of monthly views); (B) modify the data of the participant for the above elements; (C) to abolish the participant; (D) connect the auditor is for the participant; to abolish party; (E) change of auditor to the participant; (F) to abolish the auditor for the participant; (G) connect the insurer for the participant; (H) change of the insurer for the participant; (I) to abolish the insurer for the participant; (J) to add insurance for the participant, preferably comprises the following elements:

ID insurance policyReview text
ID of the insurerThe detailed text of the policy
Country codeCurrent date
Language codeEnd date
The value of the policyStatus

(K) change insurance policies for the participant for the above elements; (L) to abolish the insurance policies for the participant; (M) to add a privacy policy for a participant, preferably comprises the following elements:

Country codeDuration
Language codeCurrent date
Scoping rules textEnd date
Detailed rules textStatus

(N) change the privacy policy for a participant for the above elements; (O) to suspend the rules is onfidentiality for the participant; (P) add language to the participant; (Q) to abolish the language of the participant; (R) to join the membership level in the system; (S) to change the level of membership in the system; and (T) to cancel the membership level in the system.

(2) an External interface that allows the system to remember and maintain the information of the insurer, which includes the following functionality: (A) add data to the insurer, preferably comprises the following elements:

Last nameContact
AddressE-mail address
CityPhone
StateCurrent date
CountryEnd date
PostcodeStatus

(C) modify the data of the insurer for the above elements; and (C) to abolish the insurer.

(3) an Interface that allows the system to remember and maintain the information of the auditor, which includes the following functionality: (A) add data auditor, preferably comprises the following elements:

Last nameContact
AddressE-mail address
CityTel the background
StateCurrent date
CountryEnd date
PostcodeStatus

(B) modify the data of the auditor for the above elements; and (C) to abolish the auditor.

(4) an External interface that allows the system to remember and to support the organization, which includes the following functionality: (A) add data organization, preferably comprises the following elements:

NameContact
AddressE-mail address
CityPhone
StateCurrent date
CountryEnd date
PostcodeStatus

(C) modify the data of the organization for the above elements; and (C) to abolish the organization.

(5) an External interface that allows the system to remember and maintain information integrator, which includes the following functionality: (A) add data integrator, preferably comprises the following elements:

NameContact
AddressE-mail address
CityPhone
StateCurrent date
CountryEnd date
PostcodeStatus

(C) change the data integrator for the above elements; and (C) to abolish the integrator.

(6) an External interface that allows the system to remember and to keep the information processor of claim 3rd party, which includes the following functionality: (A) to add the data processor of claim 3 hand, preferably comprises the following elements:

NameContact
AddressE-mail address
CityPhone
StateCurrent date
CountryEnd date
PostcodeStatus

(C) change the data processor of claim 3rd parties for the above elements; and (C) to abolish the processor of claim 3rd parties.

(7) an External interface that allows the system to remember and maintain information in a language that includes the following functionality: (A) add the th language; and (C) to abolish the language.

(8) an External interface that allows the system to remember and maintain information layout types page interactive notification rules, which includes the following functionality: (a) add the option of page design interactive notification rules; and (C) to abolish the option of page design interactive notification rules.

(9) an External interface that allows the system to remember and support the proposed laws, confidentiality requirements applicable governments.

The following sequence of steps involved in the implementation of the method according to the preferred variant implementation:

(10) to Display the system page interactive notification rules with the participant's information, information, insurance policy information privacy policy, the level of participation in the system and information auditor in the language of the consumer.

(11) to Display the system page interactive notification rules for the selected country.

(12) to Display the system page interactive notification rules in the selected language.

(13) to Display the insurance policy of the party in more detail.

(14) to Display the rules of confidentiality of the participant in more detail.

(15) to Pass control back to the application Uch is stika, if the consumer has accepted the conditions of the system page interactive notification rules. Before transferring control back to generate the encrypted unique identification page interactive notification rules (the hash), preferably consisting of the following elements, when the consumer took the system page interactive notification rules:

Identification of the partyStamp date/time
Identification of countryPeriod end
Identification of languageOption layout
The IP address of the userChecksum

(16) to Pass control back to the application of the participant, if the consumer (customer) rejected the system page interactive notification rules.

(17) the Application of the participant sends the information privacy of the consumer, consisting of the following: (A) key: unique ID of the page interactive notification rules (encrypted with system key); (C) required data: (i) participant ID (encrypted with system key); (ii) the name of the user (encrypted with system key); (iii) address line (encrypted with system key); (iv)country code (encrypted with system key); (v) postal code (encrypted with system key); and (vi) end date (encrypted with system key); and (C) personal information of the consumer: personal data of the user (encrypted with system key).

(18) to Accept and be saved in the system storage device of the personal information of the consumer, consisting of the following: (A) key: unique ID of the page interactive notification rules (encrypted with system key); (C) required data: (i) participant ID (encrypted with system key); (ii) the name of the user (encrypted with system key); (iii) address line (encrypted with system key); (iv) country code (encrypted with system key); (v) postal index (encrypted with system key); and (vi) end date (encrypted with system key); and (C) personal information of the consumer: personal data of the user (encrypted with system key).

(19) Add the personal information of the consumer, consisting of the following comma-separated data elements, when participants encounter problems when interacting online with the system (divided data is copied into system information archive data): (A) key: unique ID of the page interactive notification of the government of the Ah (encrypted with system key); (C) required data: (i) participant ID (encrypted with system key); (ii) the name of the user (encrypted with system key); (iii) address line (encrypted with system key); (iv) country code (encrypted with system key); (v) postal code (encrypted with system key); and (vi) end date (encrypted with system key); and (C) personal information of the consumer: personal data of the user (encrypted with system key).

(20) an External interface that allows the system to add data related to incidents of consumer, preferably comprises the following elements: (A) the name of the initiator; (C) the address of the initiator; (C) the ID of the country of the originator; (D) postal code of the initiator; (E) the contact details of the proponent; (F) the name of the incident; (G) line 1 address incident; (H) the country code of the incident; (I) the zip code of the incident; (J) a participant in the incident; (K) the time frame of the incident; (L) type incident; and (M) the details of the incident.

In addition, the system page interactive notification rules generated for the initiator of the incident. After making the page interactive notification rules it was stored in the system storage device of the personal information of the consumer - see (12) above.

(21) Provide supporting data the e of the incident in the processor claims of third parties, the auditor or the consumer. Supporting data are preferably a combination of the following: (A) raw data from a storage device data privacy; and (C) re-generated page interactive notification rules.

(22) an External interface that allows the system to update the solution registered user incidents, including the following elements: (a) the date of the decision; (C) the text of the decision; and (3) decision code.

(23) to Inform participants about the expiration of the interactive notification rules;

(24) to Handle the confirmation of the participant expired page interactive notification rules.

(25) to Create sample data interactive notification rules with the participant for the relevant auditor. The data contains a list of active pages interactive notification rules, the last page is an interactive notification rules and those and others. Data can also refer to specific pages interactive notification rules.

(26) to Archive the data page of the participant interactive notification rules.

(27) to Check the accuracy of the data page of the participant interactive notification rules in relation to the following:

(A) reliable ID page interactive notification of the government is Oh; (C) the uniqueness of the ID page of the interactive notification rules; (C) reliable ID of the participant; (D) sequential time order date ID of the participant within the tolerance; (E) data received from participants within the boundary values of the volume; (F) accurate expiration date and reliable data to calculate the date and compare with the date of the participant; (G) a completed personal data and > number × byte; (H) provided the required information (name of the consumer, line 1 address, country code, postal code and expiration date).

(28) to Generate usage statistics of the amount of personal information of the user by date, party, country and language.

(29) to Receive and memorize statistics page request participant interactive notification rules by a participant from the device cash payment.

(30) to Create the consistency of a running sample to run on the website of the member who will check all the system pages interactive notification rules for the following and to report the following: (A) valid ID of the page interactive notification rules; (C) the unique ID of the page interactive notification rules;

(C) the expiration date of a page interactive notification rules is greater than the current date; and (D) correctly calculated expiration date.

(31) to Create glazovnet performed sample to run on the website of the participant, to carry out the processing for the ID of the interactive notification rules. If the validity of the ID page of the interactive notification rules has expired and the page interactive notification rules exist in the database of the participant, then an exception is thrown. If ID page interactive notification rules is applicable, and page interactive notification rules exist in the database of the participant to encrypt the personal data of the participant and to compare them with the data in the storage device of the personal data of the consumer.

(32) to Maintain and distribute the content of the page interactive notification rules.

(33) to Implement tool messages for a third party, which will generate the message statistics volume by date, party, country, language.

(34) Provide an algorithm that will check the authenticity of the page logo interactive notification rules when it is selected. To provide a link to a list of valid participants in the system.

(35) to Publish the document installation/system integration. In this document includes a requirement that the participant will ensure that the system page interactive notification rules generated before the participant will keep any personal data consumer is El.

The preferred implementation uses an operating system (OS) UNIX to perform the GPNA. UNIX is a proven OS that is used by many systems companies worldwide.

The preferred hardware include the following: (A) each system server (on each connector Internet database): (i) the workgroup server E-250 Sun Microsystems for database updates in real-time; (ii) the workgroup server E-250 Sun Microsystems for application server Web logic; (iii) the workgroup server Ultra 60 Sun Microsystems for services cash payment with maximum RAM, which is valid in the system configuration; (iv) 2 workgroup server Ultra 60 Sun Microsystems for the output network Web server; and a tape recorder with automatic change disks for archiving and backup.

(C) In the system center data: (i) the workgroup server Ultra 60 Sun Microsystems to distribute content (network authentication and security system access); (ii) the workgroup server E-250 Sun Microsystems for application server Web logic for processing requirements and data update partners; (iii) the workgroup server Ultra 60 Sun Microsystems for claims processing and internal graphics; (iv) the database server workgroup E-250 Sun Microsystems for archiving data and notification rules and retention requirements and update data about the partners; and (v) recorder with AVT is dramatically changing disks for archiving and backup.

A preferred software implementation of the GPNA: (A) the deployment environment: (i) application server (Web logic) software clustering; (ii) a relational database (Oracle); (iii) distributor information Inktomi; (iv) package ultrahigh-speed logic (J/SSL, Baltimore); (v) the certificate server software digital signature; (vi) the protection system of access (control point); (vii) a violation is detected on the basis of the host (notification of the offender from Axent technologies); (viii) cash payments (Epic Realm); (ix) organizing program Resonate Dispatch (global and Central) for intelligent routing; and (x) the authentication server of the network for the connection between the content distributor and services cash payments (management server Cisco secure access); and (C) development environment: (i) modeling tool (Rational Rose); (ii) the configuration management system (ClearCase); (iii) the testing tool (Silknet Sequi); (iv) IDE (Visual Café); (v) the authoring tool Web (Dream Weaver); (vi) page and utilities Java server; (vii) Web server (Netscape); (viii) Java 1.2 X and JSDK; (ix) application server Web logic; and SIBD management system (intelligent database) Oracle.

On figa, figv and figs shows the class diagram of the design for the preferred option implementation. On figa and figv see chart designed the I database for the preferred option implementation. The concept of "authorization" should be interpreted as synonymous with "notification rules".

The host system: Internet data centers located around the world for regional application of the host system (Exodus Communications or Digital Island).

Infrastructure network: (A) a specialized connection from the distributor to the content and services cash payments; and (C) high-speed connection (T3) Internet system Web server.

Software protection

For the following problems associated tools are preferred for the implementation of secure solutions for the GPNA.

(1) to Prevent unauthorized use of your "credentials" notification rules: one of the most important goals of the system is to maintain the integrity of its member organizations, subject to periodic revision process. Only those organizations that go through a rigorous process of revision, issued notification rules. Therefore, there is a real possibility that some impostors would unduly qualify for membership in the system, to plagiarize a copy of the notification rules (images), or otherwise mislead unsuspecting consumers using many fake "credentials".

Tool: image "credentials" uvedomleniya rules is dynamic - preferably a small program (applet), the reliability of which can be checked online using the GPNA. Web site system also preferably maintains a list of modern organizations-participants with their expiration dates.

(2) to Protect sensitive information sent or received via the Internet: Internet is a network of computers for General use and, as such, any communication through it is unreliable and prone to eavesdropping. Therefore, a secure way to share data is to deploy a secure private network between the participants and the system. But installing such a network is unacceptably expensive and would be an obstacle to the entry of new participants in the system.

Means: each message is encrypted/decrypted using solutions based on the key infrastructure of common use (ICOP). Asymmetric key pair at least the size of 128 bits are used for encryption/decryption. After encryption, the message is sent using SSL (secure sockets) through the Internet. The SSL session is initiated by the communication involving the two parties welcome by exchanging encryption keys, while checking digital certificates, which contain the key for General use, the domain name ("ID") of the user ID of the publisher,the serial number, period to verify the authenticity of the digital signature and the fingerprint (hash value). In summary, this secure communication includes the following steps: (A) authentication of end systems (server, client); (b) distribution of encryption keys; and (C) encryption of data sent between applications.

(3) Keep track (track data) and registration revision: recent hacker attacks on popular Web sites pose a serious threat to the integrity of the systems of the enterprises, especially in the scene B2B. You need to create a mechanism by which each transaction is registered in the system could be monitored.

Tool: the preferred system monitors the data and performs the registration audit for all critical transactions.

Although embodiments of depicted and described in the present description, support the objectives of the invention, it is obvious that various alternatives, modifications and variations will be obvious to a person skilled in the art in light of the previous description.

These alternatives, modifications and variations are included in the scope of the present invention and it should be borne in mind that the variations of the implementation presented in this description is provided only to illustrate and not to limit.

1. The exchange of data to facilitate the acceptance of laws and regulations on data protection and privacy related to the rights to privacy of individuals, which includes

transfer from the system to the computer of the person notifies the rules, informing the person involved in the potential disclosure of personal data to a server of some object, that object has confirmed its agreement with the authorized rules of confidentiality and data protection that are consistent with relevant laws and regulations on data protection and privacy, including the use of personal data, at least in the country of residence of the person or object;

the reception system of the computer entity consent of the person on the receiving server object or confirm that the server will accept and use his personal data in accordance with the rules or with the relevant laws and regulations on data protection and privacy, including the use of personal data, at least in the country of residence of the person or object;

the transmission system on the server data object that indicates that a person informed of the confidentiality rules for object and in accordance with the reception by the server of the object or has confirmed that the server object is p is animate and use that personal information in accordance with the rules or applicable laws and regulations on data protection and privacy including the use of personal data, at least in the country of residence of the person or object;

the receiving system from the server data object containing personal data received by the server object from a computer entity;

the save system mentioned personal data received from the server object, and periodically test the system, was there an object with the rules or with the relevant laws and regulations on data protection and privacy, including the use of personal data, at least in the country of residence of the individual or object.

2. The method according to claim 1, further comprising the step of informing the person that the object is protected by insurance or equivalent tool to protect against the risk to protect against the risk of loss or damage to person, resulting from misuse or loss of personal data of the person object.

3. The method according to claim 1, wherein said data indicating that the party agrees to accept the server object or confirmed that the server will accept and use the personal data of the person, contain data that uniquely identifies the detailed data relating to the consent of the person.

4. The method according to claim 3, in which said data indicating that the party agrees to accept the server object Lipatova, the server object will accept and use the personal data of the person, and uniquely identifies the detailed data relating to the consent of the person subjected to compression using a hash function.

5. The method according to claim 4, in which said data received from server object containing the personal data received by the server object from the face, include data transmitted to the server object that uniquely identifies the detailed data relating to the consent of the person.

6. The method according to claim 1, performed with many objects and persons in the same country.

7. The method according to claim 1, performed with many objects and persons in many countries.

8. The method according to claim 1, wherein the informing persons shall be in the official language of the country of residence of that person.

9. The method according to claim 1, implemented as mnogoopytny certification program of the privacy rule that requires principal objects to certify agreement with the approved privacy standards for the use of individuals ' personal data and ensure that such facilities notification rules to confirm their acceptance by the program and membership in the program.

10. The method according to claim 9, in which the approved standards meet the standards required by the United States, the European Union, or other countries, and regional organizations.

11. The method according to claim 9, further containing the step of conducting audits or other evaluations that are performed for objects, requesting or having membership in the certification program of the privacy rule to ensure that the privacy rule objects meet the standards as approved and required by the program.

12. The method according to claim 11, further containing the step of conducting random inspections or audits performed in respect of the principal objects, to verify the consistency of the objects with their approved privacy policy.

13. The method according to item 12, in which, after detection of violations of approved privacy policy object notification and request for correction feature object.

14. The method according to item 13, in which, after the failure of the object to agree with the request to correct notice of the rules of the object is canceled.

15. The method according to 14, in which, after continuing misuse notification rules the object is to be forced action to stop such use, and notification is provided to the appropriate regulatory authorities.

16. The method according to claim 1, in which data received from the server object containing the stored personal data of the person, include the period of time the consent or confirm the Denia persons the length of time during which it will be stored personal data of the person, and the choice to extend or renew the agreement or confirmation of the person if necessary, and a notification is submitted to the server object and the person before the expiration of the agreement.

17. The method according to clause 16, in which the person is given the opportunity to remove personal data from the data memory of the object after the expiration of the agreement.

18. The method according to claim 2, in which the prerequisites for membership in the certification program of the privacy rule from the object you want to come to an agreement (a) in relation to working with insurance providers or equivalent instruments guarantees against the risk for dispute resolution with the parties and (b) reimbursement of insurance providers, or equivalent instruments guarantees against the risk for the claims paid to individuals from violations of their rights to privacy.

19. The method according to claim 1, wherein the steps of transmitting notification rules, receiving the consent or approval of the person data object server and receiving data from the server object runs on the Internet.

20. Data exchange system to facilitate the harmonization of the laws and regulations on data protection and privacy-related rights the m on the privacy of individuals, contains

the system server for

informing the computer of the person involved in the potential disclosure of personal data to a server of some object, that object has confirmed its agreement with the authorized rules of confidentiality and data protection that are consistent with relevant laws and regulations for the protection of data confidentiality, including the use of personal data, at least in the country of residence of the person or object;

receiving from the computer of the person individual's consent to receive a server object or a confirmation that the server will accept and use his personal data in accordance with the rules or with the relevant laws and regulations on data protection and privacy, including the use of personal data, at least in the country of residence of the person or object;

send the server data object that indicates that a person informed of the confidentiality rules for object and in accordance with the reception of the object or has confirmed that the server will accept and use his personal data in accordance with the rules or with the relevant laws and regulations on data protection and privacy, including the use of personal data, IU the greater extent, in the country of residence of the person or object;

receiving from the server data object containing personal data received by the server object from a computer person, and periodic inspection, was there an object with the rules or with the relevant laws and regulations on data protection and privacy, including the use of personal data, at least in the country of residence of the person or object; and

the database system to save the aforementioned personal data received from the server object.

21. The system according to claim 20, further containing a means for informing the person that the object is protected by insurance or an equivalent tool to protect against risk, to protect against the risk of loss or damage to person, resulting from misuse or loss of personal data of the person object.

22. The system according to claim 20, in which said data indicating that the party agrees to accept the server object or confirmed that the server will accept and use the personal data of the person, contain data that uniquely identifies the detailed data relating to the consent of the person.

23. The system according to item 22, in which said data indicating that the person agrees to have the reception by the server of the object or has confirmed that the server will accept and use the transmit personal data of the person, and uniquely identifies detailed data relating to the consent of the person subjected to compression using a hash function.

24. The system according to item 23, in which said data received from server object containing the personal data received by the server object from a computer person, include data transmitted to the server object that uniquely identifies the detailed data relating to the consent of the person.

25. The system according to claim 20, in which the informing persons shall be in the official language of the country of residence of the person.

26. The system according to claim 20, containing means for holding mnogolyetnii certification program of the privacy rule that requires principal objects to certify agreement with the approved privacy standards for the use of individuals ' personal data, and the means to ensure such facilities notification rules to confirm their acceptance by the program and membership in the program.

27. System p, which approved standards meet the standards required by the United States, the European Union or other countries or regional organizations.

28. System p, optionally containing means to conduct audits or other evaluations that are performed for objects, requesting or having membership in the certification program the purpose of the privacy rule, to ensure that the privacy rule objects meet the standards as approved and required by the program.

29. System p additionally contains means for conducting random inspections or audits performed in respect of the principal objects, to verify the consistency of the objects with their approved privacy policy.

30. The system of clause 29, further containing a means for providing the notification object on the breach of the established rules on the confidentiality of the object after the discovery of the violation and the means for providing the request object for correction.

31. The system according to item 30, optionally containing means for cancellation of the notice of privacy after the failure of the object to agree with the request for correction.

32. System p additionally contains means for providing after any continuing misuse notification rules, the notification of such misuse to the appropriate regulatory authorities and taking enforcement action to stop such use.

33. The system according to claim 20, in which the data received from the object containing the stored personal data of the person, include the period of time the consent or approval of the person glutelin is here time during which will be stored personal data of the person, and the choice to extend or renew the agreement or confirmation of a person, if necessary, the notification is presented to the object and the person before the expiration of the agreement.

34. System p, further containing a means for providing the person with the possibility to delete personal data from the data memory of the object after the expiration of the agreement.

35. The system according to claim 20, in which as prerequisites for membership in the certification program of the privacy rule from the object you want to come to an agreement in relation to (a) work with insurance providers or equivalent instruments guarantees against the risk for dispute resolution with the parties and (b) reimbursement of insurance providers, or equivalent instruments guarantees against the risk for the claims paid to individuals from violations of their rights to privacy.



 

Same patents:

FIELD: commerce.

SUBSTANCE: method involves selling goods by way of selling system comprising stores, distributing center and selling terminal chain; transmitting signals from buyer communication means to store communication means, said signals containing information on goods ordered by buyers, and transmitting signals from buyer communication means to store and/or distributing center, said signals containing information on selling terminals selected by buyers; preparing in stores ordered goods for sending and sending said goods to distributing center and further from distributing center to selling terminals selected by buyers; also transmitting signals from store communication means to selling terminal communication means, said signals containing information on buyers orders, and/or transmitting information carriers from stores to selling terminals, said information carriers containing information on buyers orders, with goods being stored in selling terminals and dispensed therefrom to buyers. Also disclosed is goods remote selling system.

EFFECT: reduced time and costs, increased turnover of merchandize and simplified construction of delivery means.

4 cl, 3 dwg

FIELD: technologies for realization of an additional useful effect during purchase of consumer goods.

SUBSTANCE: method for realization of additional useful effect includes dispensing an individual code to consumer, providing access to commonly accessed data transfer network by means of appropriate data processing device, while wherein a software storage is present. Access to storage is performed by means of individual code, launched selected software remains accessible for a certain time, and after anticipated number of accesses individual code is blocked for any further access.

EFFECT: expanded functional capabilities and range of technical means of communication network for users, purchasing goods.

3 cl

FIELD: computer science, in particular, system for situational analysis of passenger transportation.

SUBSTANCE: system has block for selection of database addresses, block for forming recording signals and reading server database, block for controlling selection of data, first and second registers, block for comparing codes, five blocks for selecting record parameters, memory block, first group memory block, second group memory block, third group memory block.

EFFECT: higher speed of operation of system due to localization of range of data search addresses in server database using voyage group identifiers and given time period.

11 dwg

FIELD: computer science, in particular, system for situational analysis of passenger transportation.

SUBSTANCE: system has block for selection of database addresses, block for forming recording signals and reading server database, block for controlling selection of data, first and second registers, block for comparing codes, five blocks for selecting record parameters, memory block, first group memory block, second group memory block, third group memory block.

EFFECT: higher speed of operation of system due to localization of range of data search addresses in server database using voyage group identifiers and given time period.

11 dwg

FIELD: technologies for realization of an additional useful effect during purchase of consumer goods.

SUBSTANCE: method for realization of additional useful effect includes dispensing an individual code to consumer, providing access to commonly accessed data transfer network by means of appropriate data processing device, while wherein a software storage is present. Access to storage is performed by means of individual code, launched selected software remains accessible for a certain time, and after anticipated number of accesses individual code is blocked for any further access.

EFFECT: expanded functional capabilities and range of technical means of communication network for users, purchasing goods.

3 cl

FIELD: commerce.

SUBSTANCE: method involves selling goods by way of selling system comprising stores, distributing center and selling terminal chain; transmitting signals from buyer communication means to store communication means, said signals containing information on goods ordered by buyers, and transmitting signals from buyer communication means to store and/or distributing center, said signals containing information on selling terminals selected by buyers; preparing in stores ordered goods for sending and sending said goods to distributing center and further from distributing center to selling terminals selected by buyers; also transmitting signals from store communication means to selling terminal communication means, said signals containing information on buyers orders, and/or transmitting information carriers from stores to selling terminals, said information carriers containing information on buyers orders, with goods being stored in selling terminals and dispensed therefrom to buyers. Also disclosed is goods remote selling system.

EFFECT: reduced time and costs, increased turnover of merchandize and simplified construction of delivery means.

4 cl, 3 dwg

FIELD: method and system for data exchange for facilitating upholding of laws and standards on information transfers and confidentiality of individuals.

SUBSTANCE: method includes stages: transferring from system to user computer a notification, that object confirmed agreement to sanctioned confidentiality and data protection rules; receipt by system of confirmation of individual of receipt of object by server or confirmation, that object will receive and use personal data in accordance to laws active in the country where individual or object is located; transferring by system to server of data object about agreement of individual to aforementioned receipt; receipt of data object from server, containing personal data of individual; periodical check of agreement of object.

EFFECT: improved reliability of information exchanges.

2 cl, 15 dwg

FIELD: engineering of educational equipment, in particular, technology for performing exams with use of computer-based equipment.

SUBSTANCE: method includes forming on machine-readable carrier of database of simplified informative-mathematical models of operation of industries or organizations, aforementioned carrier is given to examinee with notification of variant, data are selected from database for forming more precise model of operation of organization or industry. From server along Internet network information about current values of macro- and micro-economical coefficients of country and the world are received, on basis of which examinee develops dependencies, allowing process calculations pertaining to financial and managing activities of organization or industry in given time interval, recording aforementioned dependencies on machine-readable carrier and checking these by examiner.

EFFECT: improved objectivity of estimation of knowledge of examinees.

3 cl

FIELD: engineering of systems for producing individually optimized products in accordance to request from client.

SUBSTANCE: device is made for producing care products for house pets in accordance to client requests, including food for house pets, wherein integrated client interface is used, based on the Internet, and controlling process for a series of actions, device is configured for receipt of individual data about house pets, receipt of orders for appropriate care product for house pets for each buyer, controlling equipment operation during production for processing each request, care products for house pets in accordance to requirements of each client, and for tracking product delivery through delivery system to house of client.

EFFECT: possible processing of orders from clients for food for house pets and presentation of care scheme data in accordance to individual data pertaining to house pets.

7 cl, 3 dwg

FIELD: engineering of information accumulation system, in particular - technology for performing an interactive game.

SUBSTANCE: each user is provided with means for identification as game participant, provided with a mark. As a mark, optical signal source is used. Positioning of device for receiving optical signals is performed relatively to multiple users. Source position of identification means of game participant is held relatively to means for receiving optical signals in accordance to game conditions. Game objects and rules are given to participants and game start signal is given. User targets his mark to appropriate means for receiving optical signals. Optical signals are received from game participants and received optical signals are registered in registration device. Signals are processed in accordance to given program and results are outputted on an information carrier.

EFFECT: possible polling of large group of participants and detection of winners, while maintaining anonymousness of results.

6 dwg

FIELD: engineering of equipment for processing documents.

SUBSTANCE: device has detector system for detecting characteristic signs of documents, controlling system for realization functions, connected to information, received by detector system and/or to documents processing method, aforementioned system includes memorizing device for storing a set of codes, each of which corresponds to appropriate function, and is made with possible permission of function use, if it is confirmed that transferred permitting code corresponds to one of stored function codes.

EFFECT: simplified adjustment processes of software-hardware equipment complex.

3 cl, 6 dwg

FIELD: engineering of computerized information-analytic trading means, possible use for negotiating orders for buying and selling during performing of trade operations with cashless payment using communication network.

SUBSTANCE: system has authorization and registration block, roles block, block for controlling price offers, price forming block, block for controlling formulas, logistics block, block for controlling agreements, block for finding goods and making agreements, ordering block, block for accepting, block for forming goods movement graphs, display block, block for forming characteristics of goods and goods batches, block for controlling goods, block for purchasing goods, payment block, block for registering goods at warehouses, balances block, notifications block, documents registration block, block for payments and determining payments, automatic procedures block, activation block, analytics block, goods card block, marketing block, participants block, sells block.

EFFECT: expanded functional capabilities due to control over deliveries and quality of goods and services.

1 dwg

FIELD: computer science, in particular, engineering of information effect system of information-marketing centers in integrated electronic trading infrastructure.

SUBSTANCE: system has three registration devices, two adders, block for selecting supporting recording address, block for selecting supporting reading address, block for selecting query source address, block for selecting current record address, block for forming temporal period address, block for forming database addresses, block for controlling recording and reading of data and data dispensing block.

EFFECT: improved system speed of operation by excluding renewable data search across whole database of electronic trading and localizing search only by temporal and individual signs of goods identifiers.

9 dwg

Up!